MRHS solver based on linear algebra and exhaustive search

2018 ◽  
Vol 12 (3) ◽  
pp. 143-157 ◽  
Author(s):  
Håvard Raddum ◽  
Pavol Zajac

Abstract We show how to build a binary matrix from the MRHS representation of a symmetric-key cipher. The matrix contains the cipher represented as an equation system and can be used to assess a cipher’s resistance against algebraic attacks. We give an algorithm for solving the system and compute its complexity. The complexity is normally close to exhaustive search on the variables representing the user-selected key. Finally, we show that for some variants of LowMC, the joined MRHS matrix representation can be used to speed up regular encryption in addition to exhaustive key search.

2020 ◽  
Vol 34 (05) ◽  
pp. 9330-9337
Author(s):  
Dong Xu ◽  
Wu-Jun Li

Answer selection is an important subtask of question answering (QA), in which deep models usually achieve better performance than non-deep models. Most deep models adopt question-answer interaction mechanisms, such as attention, to get vector representations for answers. When these interaction based deep models are deployed for online prediction, the representations of all answers need to be recalculated for each question. This procedure is time-consuming for deep models with complex encoders like BERT which usually have better accuracy than simple encoders. One possible solution is to store the matrix representation (encoder output) of each answer in memory to avoid recalculation. But this will bring large memory cost. In this paper, we propose a novel method, called hashing based answer selection (HAS), to tackle this problem. HAS adopts a hashing strategy to learn a binary matrix representation for each answer, which can dramatically reduce the memory cost for storing the matrix representations of answers. Hence, HAS can adopt complex encoders like BERT in the model, but the online prediction of HAS is still fast with a low memory cost. Experimental results on three popular answer selection datasets show that HAS can outperform existing models to achieve state-of-the-art performance.


Algorithms ◽  
2021 ◽  
Vol 14 (11) ◽  
pp. 309
Author(s):  
Aleksandr Cariow ◽  
Janusz P. Paplinski

The article presents a parallel hardware-oriented algorithm designed to speed up the division of two octonions. The advantage of the proposed algorithm is that the number of real multiplications is halved as compared to the naive method for implementing this operation. In the synthesis of the discussed algorithm, the matrix representation of this operation was used, which allows us to present the division of octonions by means of a vector–matrix product. Taking into account a specific structure of the matrix multiplicand allows for reducing the number of real multiplications necessary for the execution of the octonion division procedure.


2020 ◽  
pp. 1-14
Author(s):  
Siqiang Chen ◽  
Masahiro Toyoura ◽  
Takamasa Terada ◽  
Xiaoyang Mao ◽  
Gang Xu

A textile fabric consists of countless parallel vertical yarns (warps) and horizontal yarns (wefts). While common looms can weave repetitive patterns, Jacquard looms can weave the patterns without repetition restrictions. A pattern in which the warps and wefts cross on a grid is defined in a binary matrix. The binary matrix can define which warp and weft is on top at each grid point of the Jacquard fabric. The process can be regarded as encoding from pattern to textile. In this work, we propose a decoding method that generates a binary pattern from a textile fabric that has been already woven. We could not use a deep neural network to learn the process based solely on the training set of patterns and observed fabric images. The crossing points in the observed image were not completely located on the grid points, so it was difficult to take a direct correspondence between the fabric images and the pattern represented by the matrix in the framework of deep learning. Therefore, we propose a method that can apply the framework of deep learning viau the intermediate representation of patterns and images. We show how to convert a pattern into an intermediate representation and how to reconvert the output into a pattern and confirm its effectiveness. In this experiment, we confirmed that 93% of correct pattern was obtained by decoding the pattern from the actual fabric images and weaving them again.


2011 ◽  
Vol 11 (3) ◽  
pp. 382-393 ◽  
Author(s):  
Ivan Oseledets

AbstractIn this paper, the concept of the DMRG minimization scheme is extended to several important operations in the TT-format, like the matrix-by-vector product and the conversion from the canonical format to the TT-format. Fast algorithms are implemented and a stabilization scheme based on randomization is proposed. The comparison with the direct method is performed on a sequence of matrices and vectors coming as approximate solutions of linear systems in the TT-format. A generated example is provided to show that randomization is really needed in some cases. The matrices and vectors used are available from the author or at http://spring.inm.ras.ru/osel


Author(s):  
Олексій Сергійович Вамболь

Asymmetric ciphers are widely used to ensure the confidentiality of data transmission via insecure channels. These cryptosystems allow the interacting parties to create a shared secret key for a symmetric cipher in such a way that an eavesdropper gets no information useful for cryptanalysis. Network security protocols that use asymmetric ciphers include TLS, S/MIME, OpenPGP, Tor, and many others. Some of the asymmetric encryption schemes are homomorphic, that is, that they allow calculations on encrypted data to be performed without preliminary decryption. The aforesaid property makes possible using these cryptosystems not only for symmetric key establishment but also in several areas of application, in particular in secret voting protocols and cloud computing. The matrix-based knapsack cipher is a new additively homomorphic asymmetric encryption scheme, which is based on the properties of isomorphic transformations of the inner direct product of diagonal subgroups of a general linear group over a Galois field. Unlike classic knapsack encryption schemes, the cryptographic strength of this cipher depends on the computational complexity of the multidimensional discrete logarithm problem. Despite some useful properties, further research into the cryptographic strength of the matrix-based knapsack cipher has found serious drawbacks inherent in this cryptographic scheme. In the given paper an improved polynomial-time plaintext-recovery attack on the matrix-based knapsack cipher is proposed. Applying this cryptanalytic method requires only public information and has time complexity O(t1.34), where t denotes the decryption time of the attacked cryptosystem. The aforementioned attack is more productive and easier to implement in software in comparison with the original one. The advantages of the proposed method are due to using in its algorithm the simple and relatively fast matrix trace operation instead of more complex and slower transformations.


Nematology ◽  
2011 ◽  
Vol 13 (1) ◽  
pp. 17-28 ◽  
Author(s):  
Blanca Landa ◽  
Carolina Cantalapiedra-Navarrete ◽  
Juan Palomares-Rius ◽  
Pablo Castillo ◽  
Carlos Gutiérrez-Gutiérrez

AbstractDuring a recent nematode survey in natural environments of the Los Alcornocales Regional Park narrow valleys, viz., the renowned 'canutos' excavated in the mountains that maintain a humid microclimate, in southern Spain, an amphimictic population of Xiphinema globosum was identified. Morphological and morphometric studies on this population fit the original and previous descriptions and represent the first report from Spain and southern Europe. Molecular characterisation of X. globosum from Spain using D2-D3 expansion regions of 28S rRNA, 18S rRNA and ITS1-rRNA is provided and maximum likelihood and Bayesian inference analysis were used to reconstruct phylogenetic relationships within X. globosum and other Xiphinema species. A supertree solution of the different phylogenetic trees obtained in this study and in other published studies using rDNA genes are presented using the matrix representation parsimony method (MRP) and the most similar supertree method (MSSA). The results revealed a closer phylogenetic relationship of X. globosum with X. diversicaudatum, X. bakeri and with some sequences of unidentified Xiphinema spp. deposited in GenBank.


Author(s):  
W. J. Langner

Abstract The paper follows studies on simulation of three-dimensional mechanical dynamic systems with the help of sparse matrix and stiff integration numerical algorithms. For sensitivity analyses and the application of numerical optimization procedures it is substantial to calculate the effect of design parameters on the system behaviour by means of derivatives of state variables with respect to the design parameters. For static and quasi static analyses the computation of these derivatives from the governing equations leads to a linear equation system. The matrix of this set of linear equations shows to be the Jacobian matrix required in the numerical integration process solving the system of governing equations for the mechanical system. Thus the factorization of the matrix perfomed by the numerical integration algorithm can be reused solving the linear equation system for the state variable sensitivities. Some example demonstrate the simplicity of building the right hand sides of the linear equation system. Also it is demonstrated that the procedure proposed neatly fits into a modular concept for simulation model building and analysis.


Author(s):  
S.N. Masaev

The purpose of the study was to determine the problem of control of a dynamic system of higher dimension. Relying on Leontev input-output balance, we formalized the dynamic system and synthesized its control. Within the research, we developed a mathematical model that combines different working objects that consume and release various resources. The value of the penalty for all nodes and objects is introduced into the matrix representation of the problem, taking into account various options for their interaction, i.e., the observation problem. A matrix representation of the planning task at each working object is formed. For the formed system, a control loop is created; the influencing parameters of the external environment are indicated. We calculated the system operational mode, taking into account the interaction of the nodes of objects with each other when the parameters of the external environment influence them. Findings of research show that in achieving a complex result, the system is inefficient without optimal planning and accounting for the matrix of penalties for the interaction of nodes and objects of the dynamic system with each other. In a specific example, for a dynamic system with a dimension of 4.8 million parameters, we estimated the control taking into account the penalty matrix, which made it possible to increase the inflow of additional resources from the outside by 2.4 times from 130 billion conv. units up to 310 conv. units in 5 years. Taking into account the maximum optimization of control in the nodes, an increase of 3.66 times in the inflow of additional resources was ensured --- from 200.46 to 726.62 billion rubles


Sign in / Sign up

Export Citation Format

Share Document