05.12.2012 Views

NASA Scientific and Technical Aerospace Reports

NASA Scientific and Technical Aerospace Reports

NASA Scientific and Technical Aerospace Reports

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

was only able to identify DMMP down to 10 ppm. This research demonstrates it is feasible to use ATR-FTIR to detect vapor<br />

phase chemicals when combined with SPME film concentration techniques.<br />

DTIC<br />

Fourier Transformation; Infrared Detectors; Infrared Spectra; Reflectance; Solid Phases; Vapors<br />

20060002029 Texas Univ., Austin, TX, USA<br />

Superconvergence in the Generalized Finite Element Method<br />

Babuska, Ivo; Banerjee, Uday; Osborn, John E.; Jan. 1, 2005; 41 pp.; In English<br />

Contract(s)/Grant(s): N00014-99-1-0724; NSF DMS-03-41982<br />

Report No.(s): AD-A440610; No Copyright; Avail.: Defense <strong>Technical</strong> Information Center (DTIC)<br />

In this paper, we address the problem of the existence of superconvergence points of approximate solutions, obtained from<br />

the Generalized Finite Element Method (GFEM), of a Neumann elliptic boundary value problem. GFEM is a Galerkin method<br />

that uses non-polynomial shape functions. In particular, we show that the superconvergence points for the gradient of the<br />

approximate are zeros of certain systems of non-linear equations that do not depend on the solution of the boundary value<br />

problem. For approximate solutions with second derivatives, we have also characterized the superconvergence points of the<br />

second derivatives of the approximate solution as the roots of certain systems of non-linear equations. We note that it is easy<br />

to construct smooth generalized finite element approximation.<br />

DTIC<br />

Convergence; Finite Element Method; Problem Solving<br />

20060002079 National Inst. of Information <strong>and</strong> Communications Technology, Tokyo, Japan<br />

Subgroup Membership Problem <strong>and</strong> Its Applications to Information Security<br />

Yamamura, Akihiro; Saito, Taiichi; Journal of the National Institute of Information <strong>and</strong> Communications Technology. Special<br />

Issue on Information Security, Volume 52, Nos. 1/2; March/June 2005, pp. 89-99; In English; See also 20060002073;<br />

Copyright; Avail.: Other Sources<br />

The widely used algorithmic problems, the quadratic residue problem <strong>and</strong> the decision Differ-Hellman problem, are<br />

characterized as the subgroup membership problem. Several cryptographic schemes are realized assuming the hardness of the<br />

subgroup membership problem. We apply the subgroup membership problem to several information security schemes: a<br />

probabilistic encryption, a bit commitment <strong>and</strong> a private information retrieval.<br />

Author<br />

Algorithms; Information Retrieval; Security<br />

20060002081 National Inst. of Information <strong>and</strong> Communications Technology, Tokyo, Japan<br />

An Expansion Algorithm for Higher Order Differential Cryptanalysis of Secret Key Ciphers<br />

Tanaka, Hidema; Kaneko, Toshinobu; Journal of the National Institute of Information <strong>and</strong> Communications Technology.<br />

Special Issue on Information Security, Volume 52, Nos. 1/2; March/June 2005, pp. 119-128; In English; See also<br />

20060002073; Copyright; Avail.: Other Sources<br />

We show an expansion algorithm for a higher order differential cryptanalysis which is one of chosen plaintext attack<br />

against symmetric block ciphers. Ordinary algorithm of higher order differential cryptanalysis derives an attack equation for<br />

sub-keys in the last round. Our algorithm derives an attack equation for sub-keys in previous round using brute force search<br />

to the subkeys in last round. As the result, comparing with original algorithm, our algorithm can attack one more round.<br />

Though a five round modified MISTY1 which is a 64 bit block cipher can be attacked is well known, when our algorithm is<br />

used, a six round modified MISTY1 can be broken.<br />

Author<br />

Algorithms; Cryptography; Differential Equations; Algebra<br />

20060002082 National Inst. of Information <strong>and</strong> Communications Technology, Tokyo, Japan<br />

On Multi Rounds Elimination Method for Higher Order Differential Cryptanalysis<br />

Tanaka, Hidema; Tonomura, Yuji; Kaneko, Toshinobu; Journal of the National Institute of Information <strong>and</strong> Communications<br />

Technology. Special Issue on Information Security, Volume 52, Nos. 1/2; March/June 2005, pp. 135-140; In English; See also<br />

20060002073; Copyright; Avail.: Other Sources<br />

A multi rounds elimination method for higher order differential cryptanalysis is consisted of two rounds elimination attack<br />

<strong>and</strong> probabilistic higher order differential cryptanalysis. A probabilistic higher order differential cryptanalysis is a method<br />

168

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!