scholarly journals MATHEMATICAL MODELS OF HOMOGENEOUS ELEMENTS MAX, MIN BASED ON TWO-DIGIT LOGIC FUNCTIONS

Author(s):  
Dmitriy Andreev ◽  
Artem Dorodnov ◽  
Danil Lyubeckiy

Examples of using two-digit logical functions to describe basic operations of multi-valued logic are discussed.

Complexity ◽  
2017 ◽  
Vol 2017 ◽  
pp. 1-12
Author(s):  
Vedhas Pandit ◽  
Björn Schuller

We present a new technique for defining, analysing, and simplifying digital functions, through hand-calculations, easily demonstrable therefore in the classrooms. It can be extended to represent discrete systems beyond the Boolean logic. The method is graphical in nature and provides complete ‘‘implementation-free” description of the logical functions, similar to binary decision diagrams (BDDs) and Karnaugh-maps (K-maps). Transforming a function into the proposed representations (also the inverse) is a very intuitive process, easy enough that a person can hand-calculate these transformations. The algorithmic nature allows for its computing-based implementations. Because the proposed technique effectively transforms a function into a scatter plot, it is possible to represent multiple functions simultaneously. Usability of the method, therefore, is constrained neither by the number of inputs of the function nor by its outputs in theory. This, being a new paradigm, offers a lot of scope for further research. Here, we put forward a few of the strategies invented so far for using the proposed representation for simplifying the logic functions. Finally, we present extensions of the method: one that extends its applicability to multivalued discrete systems beyond Boolean functions and the other that represents the variants in terms of the coordinate system in use.


Author(s):  
Hibiki Ono ◽  
Yoshifumi Manabe

Abstract This paper proposes new card-based cryptographic protocols to calculate logic functions with the minimum number of cards using private operations under the semi-honest model. Though various card-based cryptographic protocols were shown, the minimum number of cards used in the protocol has not been achieved yet for many problems. Operations executed by a player where the other players cannot see are called private operations. Private operations have been introduced in some protocols to solve a particular problem or to input private values. However, the effectiveness of introducing private operations to the calculation of general logic functions has not been considered. This paper introduces three new private operations: private random bisection cuts, private reverse cuts, and private reveals. With these three new operations, we show that all of AND, XOR, and copy protocols are achieved with the minimum number of cards by simple three-round protocols. This paper then shows a protocol to calculate any logical functions using these private operations. Next, we consider protocols with malicious players.


2021 ◽  
pp. 03-14
Author(s):  
Bohdan Ye. Rytsar ◽  
◽  
Artem O. Belovolov ◽  

A new minimization method of logic functions of n variables in polynomial set-theoretical format has been considered. The method based on the so-called “handshaking” procedure. This procedure reflects the iterative polynomial extension of two conjuncterms of different ranks, the Hamming distance between which can be arbitrary. The advantages of the suggested method are illustrated by the examples.


2020 ◽  
Vol 3 (7) ◽  
pp. 131-152
Author(s):  
Yаroslav Sovyn ◽  
Volodymyr Khoma

The article is devoted to software bitsliced implementation of the Kalyna cipher using vector instructions SSE, AVX, AVX-512 for x86-64 processors. The advantages and disadvantages of different approaches to efficient and secure block cipher software implementation are shown. It is noted that bitslicing technology combines high speed and resistance to time and cache attacks, but its application to the Kalyna cipher is not available at the moment. The basic approaches to data representation and bitsliced encryption operations are considered, special attention is paid to the effective implementation of SubBytes operation, which largely determines the final performance. Existing methods for minimizing logical functions have been shown to either fail to produce the result in bitsliced format in the case of 8-bit non-algebraic SBoxs, or far from optimal. A heuristic algorithm for minimizing logic functions describing Kalyna SBoxes using the operations of AND, OR, XOR, NOT available in the instruction set of low- and high-end processors is proposed. The results show that a bitsliced description of one SBox requires about 520 gates, which is significantly less than other methods. Possible ways to increase performance by regrouping data into bitsliced variables before and after the SubBytes operation are indicated, which results in more efficient use of vector registers. The bitsliced implementations of Kalyna cipher were measured using C++ compilers from Microsoft and GCC for the Intel Xeon Skylake-SP processor. The results of the bitsliced Kalyna implementation can also be transferred to processors that do not support SIMD instructions, including low-end, to increase resistance to attacks through third-party channels. They also enable switching to ASIC or FPGA-based bitsliced implementation of Kalyna.


2020 ◽  
Vol 10 (13) ◽  
pp. 4682
Author(s):  
Marian A. Partyka ◽  
Maria Natorska

In this paper, the optimization of a gear pump after tooth root undercutting has been investigated; this requires the volumetric, mechanical and total efficiencies of the pump to be calculated. Due to conflict in the existing model, the total efficiency is often calculated with the assumption that the other efficiencies have acceptable values. Multiple-dimensional logical functions are an additional independent method that can be used for the optimization of a pump.


2019 ◽  
Author(s):  
Alexander Meduna ◽  
Petr Horacek ◽  
Martin Tomko
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document