NASA Scientific and Technical Aerospace Reports
NASA Scientific and Technical Aerospace Reports
NASA Scientific and Technical Aerospace Reports
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
was only able to identify DMMP down to 10 ppm. This research demonstrates it is feasible to use ATR-FTIR to detect vapor<br />
phase chemicals when combined with SPME film concentration techniques.<br />
DTIC<br />
Fourier Transformation; Infrared Detectors; Infrared Spectra; Reflectance; Solid Phases; Vapors<br />
20060002029 Texas Univ., Austin, TX, USA<br />
Superconvergence in the Generalized Finite Element Method<br />
Babuska, Ivo; Banerjee, Uday; Osborn, John E.; Jan. 1, 2005; 41 pp.; In English<br />
Contract(s)/Grant(s): N00014-99-1-0724; NSF DMS-03-41982<br />
Report No.(s): AD-A440610; No Copyright; Avail.: Defense <strong>Technical</strong> Information Center (DTIC)<br />
In this paper, we address the problem of the existence of superconvergence points of approximate solutions, obtained from<br />
the Generalized Finite Element Method (GFEM), of a Neumann elliptic boundary value problem. GFEM is a Galerkin method<br />
that uses non-polynomial shape functions. In particular, we show that the superconvergence points for the gradient of the<br />
approximate are zeros of certain systems of non-linear equations that do not depend on the solution of the boundary value<br />
problem. For approximate solutions with second derivatives, we have also characterized the superconvergence points of the<br />
second derivatives of the approximate solution as the roots of certain systems of non-linear equations. We note that it is easy<br />
to construct smooth generalized finite element approximation.<br />
DTIC<br />
Convergence; Finite Element Method; Problem Solving<br />
20060002079 National Inst. of Information <strong>and</strong> Communications Technology, Tokyo, Japan<br />
Subgroup Membership Problem <strong>and</strong> Its Applications to Information Security<br />
Yamamura, Akihiro; Saito, Taiichi; Journal of the National Institute of Information <strong>and</strong> Communications Technology. Special<br />
Issue on Information Security, Volume 52, Nos. 1/2; March/June 2005, pp. 89-99; In English; See also 20060002073;<br />
Copyright; Avail.: Other Sources<br />
The widely used algorithmic problems, the quadratic residue problem <strong>and</strong> the decision Differ-Hellman problem, are<br />
characterized as the subgroup membership problem. Several cryptographic schemes are realized assuming the hardness of the<br />
subgroup membership problem. We apply the subgroup membership problem to several information security schemes: a<br />
probabilistic encryption, a bit commitment <strong>and</strong> a private information retrieval.<br />
Author<br />
Algorithms; Information Retrieval; Security<br />
20060002081 National Inst. of Information <strong>and</strong> Communications Technology, Tokyo, Japan<br />
An Expansion Algorithm for Higher Order Differential Cryptanalysis of Secret Key Ciphers<br />
Tanaka, Hidema; Kaneko, Toshinobu; Journal of the National Institute of Information <strong>and</strong> Communications Technology.<br />
Special Issue on Information Security, Volume 52, Nos. 1/2; March/June 2005, pp. 119-128; In English; See also<br />
20060002073; Copyright; Avail.: Other Sources<br />
We show an expansion algorithm for a higher order differential cryptanalysis which is one of chosen plaintext attack<br />
against symmetric block ciphers. Ordinary algorithm of higher order differential cryptanalysis derives an attack equation for<br />
sub-keys in the last round. Our algorithm derives an attack equation for sub-keys in previous round using brute force search<br />
to the subkeys in last round. As the result, comparing with original algorithm, our algorithm can attack one more round.<br />
Though a five round modified MISTY1 which is a 64 bit block cipher can be attacked is well known, when our algorithm is<br />
used, a six round modified MISTY1 can be broken.<br />
Author<br />
Algorithms; Cryptography; Differential Equations; Algebra<br />
20060002082 National Inst. of Information <strong>and</strong> Communications Technology, Tokyo, Japan<br />
On Multi Rounds Elimination Method for Higher Order Differential Cryptanalysis<br />
Tanaka, Hidema; Tonomura, Yuji; Kaneko, Toshinobu; Journal of the National Institute of Information <strong>and</strong> Communications<br />
Technology. Special Issue on Information Security, Volume 52, Nos. 1/2; March/June 2005, pp. 135-140; In English; See also<br />
20060002073; Copyright; Avail.: Other Sources<br />
A multi rounds elimination method for higher order differential cryptanalysis is consisted of two rounds elimination attack<br />
<strong>and</strong> probabilistic higher order differential cryptanalysis. A probabilistic higher order differential cryptanalysis is a method<br />
168