lattice point enumeration
Recently Published Documents


TOTAL DOCUMENTS

8
(FIVE YEARS 2)

H-INDEX

2
(FIVE YEARS 0)

Author(s):  
Andreas Wiemers ◽  
Johannes Mittmann

AbstractRecent publications consider side-channel attacks against the key schedule of the Data Encryption Standard (DES). These publications identify a leakage model depending on the XOR of register values in the DES key schedule. Building on this leakage model, we first revisit a discrete model which assumes that the Hamming distances between subsequent round keys leak without error. We analyze this model formally and provide theoretical explanations for observations made in previous works. Next we examine a continuous model which considers more points of interest and also takes noise into account. The model gives rise to an evaluation function for key candidates and an associated notion of key ranking. We develop an algorithm for enumerating key candidates up to a desired rank which is based on the Fincke–Pohst lattice point enumeration algorithm. We derive information-theoretic bounds and estimates for the remaining entropy and compare them with our experimental results. We apply our attack to side-channel measurements of a security controller. Using our enumeration algorithm we are able to significantly improve the results reported previously for the same measurement data.


Indexing of code vectors is a most difficult task in lattice vector quantization. In this work we focus on the problem of efficient indexing and coding of indexes. Index assignment to the quantized lattice vectors is computed by direct indexing method, through which a vector can be represented by a scalar quantity which represents the index of that vector. This eliminates the need of calculating the prefix i.e. index of the radius ( R) or norm and suffix i.e. the index of the position of vector on the shell of radius R, also eliminates index assignment to the suffix based on lattice point enumeration or leader’s indexing . Two value golomb coding is used to enumerate indices of quantized lattice vectors. We use analytical means to emphasize the dominance of two value golomb code over one value golomb code. This method is applied to achieve image compression. Indexes of particular subband of test images like barbara, peppers and boat are coded using 2-value golomb coding (2-V GC) and compression ratio is calculated. We demonstrate the effectiveness of the 2-V GC while the input is scanned columnwise as compare to rowwise. Experimentally we also show that good compression ratio is achieved when only higher order bits of the indexes are encoded instead of complete bits


2013 ◽  
Vol 55 (A) ◽  
pp. 149-168
Author(s):  
JOANNA MEINEL ◽  
CATHARINA STROPPEL

AbstractLet k be an algebraically closed field of characteristic zero. I. M. Musson and M. Van den Bergh (Mem. Amer. Math. Soc., vol. 136, 1998, p. 650) classify primitive ideals for rings of torus invariant differential operators. This classification applies in particular to subquotients of localized extended Weyl algebras $\mathcal{A}_{r,n-r}=k[x_1,\ldots,x_r,x_{r+1}^{\pm1}, \ldots, x_{n}^{\pm1},\partial_1,\ldots,\partial_n],$ where it can be made explicit in terms of convex geometry. We recall these results and then turn to the corresponding primitive quotients and study their Goldie ranks. We prove that the primitive quotients fall into finitely many families whose Goldie ranks are given by a common quasi-polynomial and then realize these quasi-polynomials as Ehrhart quasi-polynomials arising from convex geometry.


Sign in / Sign up

Export Citation Format

Share Document