Loading...
Search for: exhaustive-search
0.011 seconds

    9-Round attack on AES-256 by a 6-round property

    , Article Proceedings - 2010 18th Iranian Conference on Electrical Engineering, ICEE 2010, 11 May 2010 through 13 May 2010 ; 2010 , Pages 226-230 ; 9781424467600 (ISBN) Sharifi, A ; Soleimany, H ; Aref, M ; Sharif University of Technology
    Abstract
    In this paper, we propose a new 6-round Related-Key Impossible Differential property of AES-256 and two related-key impossible differential attacks on 7 and 9 round AES-256, based on the proposed property. The overall complexity of the proposed 7 round attack is decreased by the factor 217. This is for the first time that a Related-Key Impossible Differential attack on 9-round AES-256 is successful. Also this is the first related-key attack on 9-round AES-256 that needs only 2 keys. Although the data and time complexities of the attack are approximately code book and exhaustive search, but we think the proposed property will be useful in future research like boomerang and rectangle attacks  

    Kinetic polar diagram

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 283-290 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Nouri Bygi, M ; Chitforoush, F ; Yazdandoost, M ; Ghodsi, M ; Sharif University of Technology
    2008
    Abstract
    Polar Diagram [4] is a new locus approach for problems processing angles. The solution to many important problems in Computational Geometry requires some kind of angle processing of the data input. Using the Polar Diagrma as preprocessing, exhaustive searches to find those sites with smallest angle become unnecessary. In this paper, we use the notion of kinetic data structure [1][2] to model the dynamic case of polar diagram, i.e we maintain the polar diagram of a set of continuously moving objects in the scene. We show that our proposed structure meets the main criteria of a good KDS. © 2008 Springer-Verlag  

    Exhaustive search for long low autocorrelation binary codes using length-increment algorithm

    , Article RADAR 2007 - The Institution of Engineering and Technology International Conference on Radar Systems, Edinburgh, 15 October 2007 through 18 October 2007 ; Issue 530 CP , 2007 ; 9780863418488 (ISBN) Nasrabadi, M. A ; Bastani, M. H ; Sharif University of Technology
    2007
    Abstract
    Finding binary sequences with low autocorrelation is very important in many applications and their construction is a hard computational problem. Here a new exhaustive search algorithm is developed to find all optimal aperiodic binary sequences which are faster than simple one and it achieves its efficiency through a combination of the following four devices: (1) A branch-and-bound search strategy; (2) Search logic that avoids codes redundant relative to two PSL-preserving operations; (3) A fast recursive method for computing autocorrelation functions of binary sequences; (4) A simple scheme for partitioning and parallelizing, made possible by the fixed upper bound on psl  

    PAPR reduction of OFDM signals by novel global harmony search in PTS scheme

    , Article International Journal of Digital Multimedia Broadcasting ; Volume 2012 , November , 2012 ; 16877578 (ISSN) Salehinejad, H ; Talebi, S ; Sharif University of Technology
    2012
    Abstract
    The orthogonal frequency division multiplexing (OFDM) modulation technique is one of the key strategies for multiuser signal transmission especially in smart grids and wind farms. This paper introduces an approach for peak-to-average power ratio (PAPR) reduction of such signals based on novel global harmony search (NGHS) and partial transmit sequence (PTS) schemes. In PTS technique, the data block to be transmitted is partitioned into disjoint subblocks, which are combined using phase factors to minimize PAPR. The PTS requires an exhaustive search over all combinations of allowed phase factors. Therefore, with respect to the fast implementation and simplicity of NGHS technique, we could... 

    Optimal PMU placement by an equivalent linear formulation for exhaustive search

    , Article IEEE Transactions on Smart Grid ; Volume 3, Issue 1 , 2012 , Pages 174-182 ; 19493053 (ISSN) Azizi, S ; Dobakhshari, A. S ; Nezam Sarmadi, S. A ; Ranjbar, A. M ; Sharif University of Technology
    Abstract
    Observability of bulk power transmission network by means of minimum number of phasor measurement units (PMUs), with the aid of the network topology, is a great challenge. This paper presents a novel equivalent integer linear programming method (EILPM) for the exhaustive search-based PMU placement. The state estimation implemented based on such a placement is completely linear, thereby eliminating drawbacks of the conventional SCADA-based state estimation. Additional constraints for observability preservation following single PMU or line outages can easily be implemented in the proposed EILPM. Furthermore, the limitation of communication channels is dealt with by translation of nonlinear... 

    Heuristic guess-and-determine attacks on stream ciphers

    , Article IET Information Security ; Volume 3, Issue 2 , 2009 , Pages 66-73 ; 17518709 (ISSN) Ahmadi, H ; Eghlidos, T ; Sharif University of Technology
    2009
    Abstract
    Guess-and-determine (GD) attacks are general attacks on stream ciphers, which have often been implemented in an ad hoc manner. The authors introduce a heuristic approach to the design of GD attacks, that is a dynamic programming method using a Viterbi-like algorithm which is a well-known decoding algorithm for convolutional codes. The authors also show that with this method, the resulting GD attacks, named heuristic GD (HGD) attacks, on TIPSY, SNOW1 and SNOW2 lead to less computational complexity than the previously known GD attacks. The main advantage of HGD attacks, over ad hoc GD attacks, is that while being powerful, they can be designed algorithmically for classes of stream ciphers,...