scholarly journals A General Proof Framework for Recent AES Distinguishers

Author(s):  
Christina Boura ◽  
Anne Canteaut ◽  
Daniel Coggia

In this paper, a new framework is developed for proving and adapting the recently proposed multiple-of-8 property and mixture-differential distinguishers. The above properties are formulated as immediate consequences of an equivalence relation on the input pairs, under which the difference at the output of the round function is invariant. This approach provides a further understanding of these newly developed distinguishers. For example, it clearly shows that the branch number of the linear layer does not influence the validity of the property, on the contrary of what was previously believed. We further provide an extension of the mixture-differential distinguishers and multiple-of-8 property to any SPN and to a larger class of subspaces. These adapted properties can then be exhibited in a systematic way for other ciphers than the AES. We illustrate this with the examples of Midori, Klein, LED and Skinny.

2019 ◽  
Vol 1 (2) ◽  
pp. 99-120 ◽  
Author(s):  
Tongtao Zhang ◽  
Heng Ji ◽  
Avirup Sil

We propose a new framework for entity and event extraction based on generative adversarial imitation learning—an inverse reinforcement learning method using a generative adversarial network (GAN). We assume that instances and labels yield to various extents of difficulty and the gains and penalties (rewards) are expected to be diverse. We utilize discriminators to estimate proper rewards according to the difference between the labels committed by the ground-truth (expert) and the extractor (agent). Our experiments demonstrate that the proposed framework outperforms state-of-the-art methods.


2018 ◽  
Vol 5 (4) ◽  
pp. 34
Author(s):  
Paul B Timotiwu ◽  
Agustiansyah . ◽  
Ermawati . ◽  
Suci Amalia

This study was aimed to determine the effect of the increasing silica and boron concentration and their interaction on plant growth and soybean yield. This research was conducted from April-September 2017 in the integrated field of the experiment at the University Lampung. The treatments were 0 and 5 ppm Boron (B) fertilizer and Silica (Si) concentrations in 6 levels (0, 25, 50, 75, and 100 ppm). The difference between the means of B were calculated by using Orthogonal Contrast and response of Si was used Polynomial at a 0.05. The results showed that application of 5 ppm of B foliarly produced higher of soybean growth and production than without B treatment through variables of the dry weight and grain weight. Application of up to 125 ppm of Si foliarly was improved of soybean growth and production through variables of plant height, number of leaf, leaf area, dry weight and number of productive branch, number of pods, filled pod, and grain weight, but it didn’t affect the percentage of empty pods. The response of soybean growth and production to the increasing Si didn’t depend on the foliar B which was showed in all variables.


2007 ◽  
Vol 73 ◽  
pp. 59-73 ◽  
Author(s):  
Benjamin Edwards

This paper reinterprets the archaeological evidence from the Neolithic monument complex in the Milfield Basin, Northumberland; a palimpsest landscape of earlier Neolithic enclosures, later Neolithic henges and Early Bronze Age burial monuments. Recent interpretative accounts of the Early Neolithic use of this complex have stressed economic factors as the driving-forces behind enclosure construction, whilst the six major later Neolithic henges have been integrated into a scheme of ritual processions. These interpretations are critically evaluated and the sites are placed in their regional and national context in an attempt to provide a new framework for the use and development of the complex. It is concluded that, far from having simplistic economic functions, the earlier Neolithic enclosures could be unique to the area. Representing the formalisation of a community's attempts to ensure social reproduction in times of change, through the articulation of the difference between circular and linear monumental forms. The re-examination of the later Neolithic evidence raises interesting questions as to how far we can ‘read’ monument complexes, and critically evaluates the extent to which we can argue a unity of purpose for these enigmatic accumulations of the past. Importantly, the reinterpretation of the Neolithic activity in this area exposes how readily archaeologists export social models from other regions, such as Wessex, and attempt to fit very diverse evidence into their framework. This paper concludes that we must continue the definition of the British Neolithic on a more regional basis and accept that core-periphery models, even if not explicitly articulated, have no place in archaeological explanation.


Sensors ◽  
2019 ◽  
Vol 19 (16) ◽  
pp. 3576 ◽  
Author(s):  
Peng Zhang ◽  
Lifu Chen ◽  
Zhenhong Li ◽  
Jin Xing ◽  
Xuemin Xing ◽  
...  

The water and shadow areas in SAR images contain rich information for various applications, which cannot be extracted automatically and precisely at present. To handle this problem, a new framework called Multi-Resolution Dense Encoder and Decoder (MRDED) network is proposed, which integrates Convolutional Neural Network (CNN), Residual Network (ResNet), Dense Convolutional Network (DenseNet), Global Convolutional Network (GCN), and Convolutional Long Short-Term Memory (ConvLSTM). MRDED contains three parts: the Gray Level Gradient Co-occurrence Matrix (GLGCM), the Encoder network, and the Decoder network. GLGCM is used to extract low-level features, which are further processed by the Encoder. The Encoder network employs ResNet to extract features at different resolutions. There are two components of the Decoder network, namely, the Multi-level Features Extraction and Fusion (MFEF) and Score maps Fusion (SF). We implement two versions of MFEF, named MFEF1 and MFEF2, which generate separate score maps. The difference between them lies in that the Chained Residual Pooling (CRP) module is utilized in MFEF2, while ConvLSTM is adopted in MFEF1 to form the Improved Chained Residual Pooling (ICRP) module as the replacement. The two separate score maps generated by MFEF1 and MFEF2 are fused with different weights to produce the fused score map, which is further handled by the Softmax function to generate the final extraction results for water and shadow areas. To evaluate the proposed framework, MRDED is trained and tested with large SAR images. To further assess the classification performance, a total of eight different classification frameworks are compared with our proposed framework. MRDED outperformed by reaching 80.12% in Pixel Accuracy (PA) and 73.88% in Intersection of Union (IoU) for water, 88% in PA and 77.11% in IoU for shadow, and 95.16% in PA and 90.49% in IoU for background classification, respectively.


Author(s):  
Ling Song ◽  
Yi Tu ◽  
Danping Shi ◽  
Lei Hu

AbstractSubterranean 2.0 is a cipher suite that can be used for hashing, authenticated encryption, MAC computation, etc. It was designed by Daemen, Massolino, Mehrdad, and Rotella, and has been selected as a candidate in the second round of NIST’s lightweight cryptography standardization process. Subterranean 2.0 is a duplex-based construction and utilizes a single-round permutation in the duplex. It is the simplicity of the round function that makes it an attractive target of cryptanalysis. In this paper, we examine the single-round permutation in various phases of Subterranean 2.0 and specify three related attack scenarios that deserve further investigation: keystream biases in the keyed squeezing phase, state collisions in the keyed absorbing phase, and one-round differential analysis in the nonce-misuse setting. To facilitate cryptanalysis in the first two scenarios, we novelly propose a set of size-reduced toy versions of Subterranean 2.0: Subterranean-m. Then we make an observation for the first time on the resemblance between the non-linear layer in the round function of Subterranean 2.0 and SIMON’s round function. Inspired by the existing work on SIMON, we propose explicit formulas for computing the exact correlation of linear trails of Subterranean 2.0 and other ciphers utilizing similar non-linear operations. We then construct our models for searching trails to be used in the keystream bias evaluation and state collision attacks. Our results show that most instances of Subterranean-m are secure in the first two attack scenarios but there exist instances that are not. Further, we find a flaw in the designers’ reasoning of Subterranean 2.0’s linear bias but support the designers’ claim that there is no linear bias measurable from at most $$2^{96}$$ 2 96 data blocks. Due to the time-consuming search, the security of Subterranean 2.0 against the state collision attack in keyed modes still remains an open question. Finally, we observe that one-round differentials allow to recover state bits in the nonce-misuse setting. By proposing nested one-round differentials, we obtain a sufficient number of state bits, leading to a practical state recovery with only 20 repetitions of the nonce and 88 blocks of data. It is noted that our work does not threaten the security of Subterranean 2.0.


2018 ◽  
Vol 29 (11) ◽  
pp. 1846-1858 ◽  
Author(s):  
Matthew Fisher ◽  
Frank C. Keil

One of the mind’s most fundamental tasks is interpreting incoming data and weighing the value of new evidence. Across a wide variety of contexts, we show that when summarizing evidence, people exhibit a binary bias: a tendency to impose categorical distinctions on continuous data. Evidence is compressed into discrete bins, and the difference between categories forms the summary judgment. The binary bias distorts belief formation—such that when people aggregate conflicting scientific reports, they attend to valence and inaccurately weight the extremity of the evidence. The same effect occurs when people interpret popular forms of data visualization, and it cannot be explained by other statistical features of the stimuli. This effect is not confined to explicit statistical estimates; it also influences how people use data to make health, financial, and public-policy decisions. These studies ( N = 1,851) support a new framework for understanding information integration across a wide variety of contexts.


2020 ◽  
Vol 11 (2) ◽  
pp. 9-30
Author(s):  
Enrico Giannetto

After the publication of Jaques Derrida’s book, L’animal que donc je suis, anti-speciesism has been looking for a theoretical foundation for its ethical content. In my opinion, the defect of all these philosophical perspectives is that they still reduce animals to objects of human philosophy. Here, I develop a new framework in which animals are considered as subjects of their own philosophy. In analogy to the concept of ethnophilosophy, the concept of speciophilosophy is here introduced (§ 1, §3). The different ways of thinking between humans and other animals are outlined, by explaining the difference between verbal reasoning and thinking through images (§ 2). Human philosophies are shown to be anthropocentric ideologies, related to carnivorism (§4, § 8). Subsequently, animal speciophilosophies are discussed (§6) and a dialogical symphilosophein (§ 5) among all living beings is proposed to be the extension of the so-called philosophy of dialogue. Finally, it is shown how this perspective was present in the original Christian ethics (§7, §9, § 10).


1995 ◽  
Vol 124 (2) ◽  
pp. 205-212 ◽  
Author(s):  
N. Teuber ◽  
A. S. Laidlaw

SUMMARYThe proportion of sward area rejected for grazing under different stocking intensities in grass-white clover (Trifolium repens L.) swards continuously grazed by steers toconstant sward height was determined and the effect of these areas on clover stolon developmentwas investigated.In a randomized block field experiment, grazing treatments imposed from 1988 to 1991 comprised target sward surface heights (SSH) of 5, 7 or 9 cm from April to July followed by 7 or 9 cm from July to October (i.e. six treatments). The percentage area rejected was higher in 9 cm than in the shorter swards, the proportion of the total areas rejected increasing generally over the year. Within the rejected areas in spring the number of branches on the main axes of white clover plants was only 17% and the mean number of nodes per branch was 14% of those in grazed areas. Corresponding percentages in summer in rejected areas were 56 and 46% compared with grazed areas.In a glasshouse experiment involving stolons grown for 18–21 days, the difference between those from grazed and rejected areas in branch number per stolon and mean node number per branch was much reduced. Branching and rate of branch development (node number) were slower in stolons maintained under dark conditions.Mean growing point density over six sampling dates from summer 1990 to autumn 1991 was significantly higher in the 5 cm than in the 9 cm spring SSH treatment. Although rejected areashad only 34% of the growing point density of grazed areas in autumn, the latter comprised the majority of the total area in most sward height treatments and so reduced the overall effect of rejected areas on growing point density.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Xuan Shen ◽  
Lei Cheng ◽  
Bing Sun ◽  
Jun He

Impossible differential attack is one of the most effective cryptanalytic methods for block ciphers. Its key step is to construct impossible differential distinguishers as long as possible. In this paper, we mainly focus on constructing longer impossible differential distinguishers for two kinds of generalized Feistel structures which are m -dataline CAST256-like and MARS-like structures. When their round function takes Substitution Permutation SP and Substitution Permutation Substitution SPS types, they are called CAST 256 SP / CAST 256 SPS and MARS SP / MARS SPS , respectively. For CAST 256 SP / CAST 256 SPS , the best known result for the length of the impossible differential distinguisher was m 2 + m / m 2 + m − 1 rounds, respectively. With the help of the linear layer P , we can construct m 2 + m + Λ 0 / m 2 + m + Λ 1 -round impossible differential distinguishers, where Λ 0 and Λ 1 are non-negative numbers if P satisfies some restricted conditions. For MARS SPS , the best known result for the length of the impossible differential distinguisher was 3 m − 1 rounds. We can construct 3 m -round impossible differential distinguishers which are 1 round longer than before. To our knowledge, the results in this paper are the best for the two kinds of generalized Feistel structures.


Author(s):  
Francesco Dagnino ◽  
Viviana Bono ◽  
Elena Zucca ◽  
Mariangiola Dezani-Ciancaglini

AbstractWe propose a general proof technique to show that a predicate is sound, that is, prevents stuck computation, with respect to a big-step semantics. This result may look surprising, since in big-step semantics there is no difference between non-terminating and stuck computations, hence soundness cannot even be expressed. The key idea is to define constructions yielding an extended version of a given arbitrary big-step semantics, where the difference is made explicit. The extended semantics are exploited in the meta-theory, notably they are necessary to show that the proof technique works. However, they remain transparent when using the proof technique, since it consists in checking three conditions on the original rules only, as we illustrate by several examples.


Sign in / Sign up

Export Citation Format

Share Document