搜索结果: 1-15 共查到“subspace”相关记录54条 . 查询时间(0.046 秒)
Invariant subspaces (Crypto'11) and subspace trails (FSE'17) are two related recent cryptanalytic approaches that led to new results on, e. g. PRINTCipher and AES. We extend the invariant subspace app...
NOVEL HYPERSPECTRAL ANOMALY DETECTION METHODS BASED ON UNSUPERVISED NEAREST REGULARIZED SUBSPACE
Anomaly detection Hyperspectral imagery Unsupervised nearest regularized subspace Outlier Removal Local summation Dual-window sliding
2018/5/14
Anomaly detection has been of great interest in hyperspectral imagery analysis. Most conventional anomaly detectors merely take advantage of spectral and spatial information within neighboring pixels....
Security Analysis of a Dynamic Threshold Secret Sharing Scheme Using Linear Subspace Method
Dynamic threshold Linear subspace Forging
2017/11/14
A dealer-free and non-interactive dynamic threshold secret sharing scheme has been proposed by Harn et.al., in 2015. In this scheme, a (t; n) secret sharing scheme in secret reconstruction phase can t...
New Observations on Invariant Subspace Attack
Invariant subspace attack AES-like Lightweight block ciphers
2017/3/28
Invariant subspace attack is a novel cryptanalytic technique which breaks several recently proposed lightweight block ciphers. In this paper, we propose a new method to bound the dimension of some inv...
Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
PRINCE Subspace Trails Cryptanalysis Invariant Subspace Attack
2016/12/8
Subspace trail cryptanalysis is a very recent new cryptanalysis
technique, and includes differential, truncated differential, impossible
differential, and integral attacks as special cases.
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs
Midori Block Cipher Invariant Subspace Attack
2016/12/8
We present an invariant subspace attack on the block cipher Midori64, proposed at Asiacrypt 2015. Our analysis shows that Midori64 has a class of 2^{32} weak keys. Under any such key, the cipher can b...
CLASSIFICATION OF PHOTOGRAMMETRIC POINT CLOUDS OF SCAFFOLDS FOR CONSTRUCTION SITE MONITORING USING SUBSPACE CLUSTERING AND PCA
Scaffolding components Photogrammetric point clouds Subspace clustering PCA Classification
2016/7/28
This paper presents an approach for the classification of photogrammetric point clouds of scaffolding components in a construction site, aiming at making a preparation for the automatic monitoring of ...
HYPERSPECTRAL IMAGE KERNEL SPARSE SUBSPACE CLUSTERING WITH SPATIAL MAX POOLING OPERATION
Hyperspectral image nonlinear processing spatial max pooling SSC kernel
2016/7/28
In this paper, we present a kernel sparse subspace clustering with spatial max pooling operation (KSSC-SMP) algorithm for hyperspectral remote sensing imagery. Firstly, the feature points are mapped f...
Subspace Trail Cryptanalysis and its Applications to AES
Block cipher AES Invariant Subspace Attack
2016/6/8
We introduce subspace trail cryptanalysis, a generalization
of invariant subspace cryptanalysis. With this more generic treatment of
subspaces we do no longer rely on specific choices of round const...
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
Cryptanalysis Lightweight Cryptography Invariant Subspace
2016/1/4
Invariant subspace attacks were introduced at CRYPTO 2011 to cryptanalyze
PRINTcipher. The invariant subspaces for PRINTcipher were discovered in an ad hoc
fashion, leaving a generic technique to di...
In this paper, we present an invariant subspace attack against
block cipher Midori64 which has recently been proposed by Banik et al. at
Asiacrypt 2015 to achieve low energy consumption. We show tha...
Signing a Linear Subspace: Signature Schemes for Network Coding
Network Coding Signature Schemes
2015/8/5
Network coding offers increased throughput and improved robustness to random faults in completely decentralized networks. In contrast to traditional routing schemes, however, network coding requires i...
Function-Private Subspace-Membership Encryption and Its Applications
Function privacy functional encryption
2015/8/5
Boneh, Raghunathan, and Segev (CRYPTO '13) have recently put forward the notion of function privacy and applied it to identity-based encryption, motivated by the need for providing predicate privacy i...
MINRES-QLP: A KRYLOV SUBSPACE METHOD FOR INDEFINITE OR SINGULAR SYMMETRIC SYSTEMS
MINRES Krylov subspace method Lanczos process
2015/7/3
CG, SYMMLQ, and MINRES are Krylov subspace methods for solving symmetric
systems of linear equations. When these methods are applied to an incompatible system (that is,
a singular symmetric least-sq...
A Subspace Approach to Balanced Truncation for Model Reduction of Nonlinear Control Systems
Model Reduction Balanced Truncation
2015/6/19
In this paper we introduce a new method of model reduction for nonlinear control systems. Our approach is to construct an approximately balanced realization. The method requires only standard matrix c...