On universal classes of fast high performance hash functions, their time-space tradeoff, and their applications

Author(s):  
A. Siegel
Author(s):  
G. R. Pennock ◽  
B. S. Ryuh

Abstract The use of a computer-controlled multirobot system with sensors in batch manufacturing and assembly tasks offers a number of significant advantages. These include cost savings, reliability, tolerance of working environments unacceptable to humans, and an adaptability to both structured and unstructured environments through simple reprogramming. The end results are improved productivity, efficiency, and flexibility in manufacturing and automation. However, the use of two or more cooperating robots has not been fully exploited to date. Current industrial practice employs simple time-space coordination which does not allow more than one robot working in a common workspace, such coordination and control results in under-utilization of robots. With the increasing demand for high performance manipulators and efficient multirobot manufacturing cells, there is a vital need to develop theoretical and design methodologies that will solve the generic problems faced by industrial robots working cooperatively. If multirobot systems are to be used in manufacturing and assembly tasks, a thorough knowledge of the dynamics of such systems is essential. This paper formulates the dynamics of two robots cooperating to move a rigid body object. The analysis is based on Newtonian mechanics with screw calculus and dual transformation matrices.


1979 ◽  
Vol 18 (2) ◽  
pp. 143-154 ◽  
Author(s):  
J.Lawrence Carter ◽  
Mark N. Wegman

2020 ◽  
Vol 17 (6) ◽  
pp. 2435-2440
Author(s):  
Arvind K. Sharma ◽  
S. K. Mittal

Cryptography is a branch of Computer-Science which fully devotes towards further enhancements or innovations of various applications concern to information security i.e., to manage Confidentiality/ Integrity of resources. Confidentiality of resources most probably look after by ‘Encryption–Decryption’ techniques like ‘DES,’ ‘AES,’ ‘Blowfish,’ ‘Two-Fish,’ etc., were as ‘Integrity’ managed by Hash Functions, which have a distinct paramount significance in Network-Security/Computer- Security/Internet-Security. Both the ‘Integrity’ of data and ‘Authenticity’ of resource proved with the help of digest generated by the Hash algorithm. There are several hash algorithms available to provide distinct security, depends on how hard is to break it and pre-defined resource utilization (time/space). Some well-known names are MD4, MD5, SHA, JH, Skein, Grøstl, Blake, Hamsi, Fugue, Crush, Whirlpool, Tav, etc. In this article, we are focusing on vulnerabilities in the Merkle- Damgard scheme for constructing Hash-Functions with suitable implementation of MD5.


Author(s):  
Stefan Kölbl ◽  
Martin M. Lauridsen ◽  
Florian Mendel ◽  
Christian Rechberger

Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared towards high performance on long inputs. However, various applications exist where the performance on short (fixed length) inputs matters more. Such hash functions are the bottleneck in hash-based signature schemes like SPHINCS or XMSS, which is currently under standardization. Secure functions specifically designed for such applications are scarce. We attend to this gap by proposing two short-input hash functions (or rather simply compression functions). By utilizing AES instructions on modern CPUs, our proposals are the fastest on such platforms, reaching throughputs below one cycle per hashed byte even for short inputs, while still having a very low latency of less than 60 cycles. Under the hood, this results comes with several innovations. First, we study whether the number of rounds for our hash functions can be reduced, if only second-preimage resistance (and not collision resistance) is required. The conclusion is: only a little. Second, since their inception, AES-like designs allow for supportive security arguments by means of counting and bounding the number of active S-boxes. However, this ignores powerful attack vectors using truncated differentials, including the powerful rebound attacks. We develop a general tool-based method to include arguments against attack vectors using truncated differentials.


2020 ◽  
Vol 10 (2) ◽  
pp. 598
Author(s):  
Xuefeng Guan ◽  
Chong Xie ◽  
Linxu Han ◽  
Yumei Zeng ◽  
Dannan Shen ◽  
...  

During the exploration and visualization of big spatio-temporal data, massive volume poses a number of challenges to the achievement of interactive visualization, including large memory consumption, high rendering delay, and poor visual effects. Research has shown that the development of distributed computing frameworks provides a feasible solution for big spatio-temporal data management and visualization. Accordingly, to address these challenges, this paper adopts a proprietary pre-processing visualization scheme and designs and implements a highly scalable distributed visual analysis framework, especially targeted at massive point-type datasets. Firstly, we propose a generic multi-dimensional aggregation pyramid (MAP) model based on two well-known graphics concepts, namely the Spatio-temporal Cube and 2D Tile Pyramid. The proposed MAP model can support the simultaneous hierarchical aggregation of time, space, and attributes, and also later transformation of the derived aggregates into discrete key-value pairs for scalable storage and efficient retrieval. Using the generated MAP datasets, we develop an open-source distributed visualization framework (MAP-Vis). In MAP-Vis, a high-performance Spark cluster is used as a parallel preprocessing platform, while distributed HBase is used as the massive storage for the generated MAP data. The client of MAP-Vis provides a variety of correlated visualization views, including heat map, time series, and attribute histogram. Four open datasets, with record numbers ranging from the millions to the tens of billions, are chosen for system demonstration and performance evaluation. The experimental results demonstrate that MAP-Vis can achieve millisecond-level query response and support efficient interactive visualization under different queries on the space, time, and attribute dimensions.


2021 ◽  
Vol 2069 (1) ◽  
pp. 012198
Author(s):  
Stefano Fantucci ◽  
Fabio Favoino ◽  
Elisa Fenoglio ◽  
Valentina Serra ◽  
Marco Perino ◽  
...  

Abstract The development of lightweight and multifunctional curtain wall systems, which integrate different technological solutions, is aimed at achieving increasingly higher requirements related to energy efficiency as well as indoor environmental quality in non-residential buildings. On one hand lightweight and thin façade elements present several advantages (such as construction time, space, and transportation savings, less weight on primary structure etc.), while facing the challenge of guaranteeing the required thermal and acoustic performance and achieving legislative compliance on the other. In the framework of the Horizon 2020 Project Powerskin+ a new concept of multifunctional façade, which combines high performance insulation, energy harvesting, heating system, and latent heat storage capabilities is under development. Within the design process of the different sub-modules (opaque and transparent), performance calculations are carried out by means of existing simulation tools, or ad-hoc developed models for more complex systems. In this study, the authors present the main steps required to accelerate the simulation-based design process and the future thermal and acoustic optimization of the novel lightweight and multifunctional façade element.


Sign in / Sign up

Export Citation Format

Share Document