Previous Research

S. Hoory
{"title":"Previous Research","authors":"S. Hoory","doi":"10.2307/j.ctv172wq.10","DOIUrl":null,"url":null,"abstract":"In general I am interested in real world problems that can be attacked with mathematical tools. For example, I ask the following question: Is the secure mode of Internet browsers really secure? The underlying cryptographic standard is DES. Therefore, the natural interpretation of the problem is to ask whether there exists a polynomial time algorithm for breaking DES-like constructions. However, proving such a statement involves separating P from NP . Instead of confronting this fundumental open question, I reformulated the problem as an information theoretic question, and obtained concrete results using the well developed machinery of Markov chains. My past research has direct applications to cryptography, coding, proof systems, and complexity, using tools from graph theory, especially Markov chains and expander graphs.","PeriodicalId":426566,"journal":{"name":"English Comparative Correlatives","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"English Comparative Correlatives","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2307/j.ctv172wq.10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

In general I am interested in real world problems that can be attacked with mathematical tools. For example, I ask the following question: Is the secure mode of Internet browsers really secure? The underlying cryptographic standard is DES. Therefore, the natural interpretation of the problem is to ask whether there exists a polynomial time algorithm for breaking DES-like constructions. However, proving such a statement involves separating P from NP . Instead of confronting this fundumental open question, I reformulated the problem as an information theoretic question, and obtained concrete results using the well developed machinery of Markov chains. My past research has direct applications to cryptography, coding, proof systems, and complexity, using tools from graph theory, especially Markov chains and expander graphs.
先前的研究
总的来说,我对可以用数学工具解决的现实问题感兴趣。例如,我问这样一个问题:Internet浏览器的安全模式真的安全吗?底层的加密标准是DES。因此,对这个问题的自然解释是问是否存在一个多项式时间算法来破解类DES结构。然而,证明这样的陈述涉及将P与NP分离。我没有面对这个基本的开放问题,而是将其重新表述为一个信息论问题,并使用发达的马尔可夫链机制获得了具体的结果。我过去的研究直接应用于密码学、编码、证明系统和复杂性,使用图论中的工具,特别是马尔可夫链和扩展图。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信