Abstract. Camellia and MISTY1 are Feistel block ciphers. In this paper, we observe that, when conducting impossible differential cryptanalysis on Camellia and MISTY1, their round s...
Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunke...
In this paper, we consider periodic linear systems driven by T0-periodic signals that we desire to reconstruct. The systems under consideration are of the form ˙x =A(t)x +A0(t)w(...
Jonathan Chauvin, Gilles Corde, Nicolas Petit, Pie...
The Internet is widely valued for distributing control over information to a lateral network of individuals, but it is not clear how these networks can most effectively organize t...
Cristen Torrey, Moira Burke, Matthew L. Lee, Anind...
— Skid-steered vehicles, by design, must skid in order to maneuver. The skidding causes the vehicle to behave discontinuously as well as introduces complications to the observati...
Negative bias temperature instability (NBTI) has been a significant reliability concern in current digital circuit design due to its effect of increasing the path delay with time a...
Song Jin, Yinhe Han, Lei Zhang 0008, Huawei Li, Xi...