V. P. D. Sá, D. Boccardo, L. D. C. Carmo, Raphael Machado
{"title":"A tight bound for exhaustive key search attacks against Message Authentication Codes","authors":"V. P. D. Sá, D. Boccardo, L. D. C. Carmo, Raphael Machado","doi":"10.1051/ITA/2012025","DOIUrl":"https://doi.org/10.1051/ITA/2012025","url":null,"abstract":"A Message Authentication Code (MAC) is a function that takes a message and a key as parameters and outputs an authentication of the message. MAC are used to guarantee the legitimacy of messages exchanged through a network, since generating a correct authentication requires the knowledge of the key defined secretly by trusted parties. However, an attacker with access to a sufficiently large number of message/authentication pairs may use a brute force algorithm to infer the secret key: from a set containing initially all possible key candidates, subsequently remove those that yield an incorrect authentication, proceeding this way for each intercepted message/authentication pair until a single key remains. In this paper, we determine an exact formula for the expected number of message/authentication pairs that must be used before such form of attack is successful, along with an asymptotical bound that is both simple and tight. We conclude by illustrating a modern application where this bound comes in handy, namely the estimation of security levels in reflection-based verification of software integrity.","PeriodicalId":438841,"journal":{"name":"RAIRO Theor. Informatics Appl.","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114542456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cutwidth of iterated caterpillars","authors":"Lan Lin, Yixun Lin","doi":"10.1051/ita/2012032","DOIUrl":"https://doi.org/10.1051/ita/2012032","url":null,"abstract":"The cutwidth is an important graph-invariant in circuit layout designs. The cutwidth of a graph G is the minimum value of the maximum number of overlap edges when G is embedded into a line. A caterpillar is a tree which yields a path when all its leaves are removed. An iterated caterpillar is a tree which yields a caterpillar when all its leaves are removed. In this paper we present an exact formula for the cutwidth of the iterated caterpillars.","PeriodicalId":438841,"journal":{"name":"RAIRO Theor. Informatics Appl.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131366220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Signed Chip Firing Games and symmetric Sandpile Models on the cycles","authors":"R. Cori, T. H. Phan, Tran Thi Thu Huong","doi":"10.1051/ita/2012023","DOIUrl":"https://doi.org/10.1051/ita/2012023","url":null,"abstract":"We investigate the Sandpile Model and Chip Firing Game and an extension of these models on cycle graphs. The extended model consists of allowing a negative number of chips at each vertex. We give the characterization of reachable configurations and of fixed points of each model. At the end, we give explicit formula for the number of their fixed points.","PeriodicalId":438841,"journal":{"name":"RAIRO Theor. Informatics Appl.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122429507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integers in number systems with positive and negative quadratic Pisot base","authors":"Z. Masáková, T. Vávra","doi":"10.1051/ita/2014013","DOIUrl":"https://doi.org/10.1051/ita/2014013","url":null,"abstract":"We consider numeration systems with base $beta$ and $-beta$, for quadratic Pisot numbers $beta$ and focus on comparing the combinatorial structure of the sets $Z_beta$ and $Z_{-beta}$ of numbers with integer expansion in base $beta$, resp. $-beta$. Our main result is the comparison of languages of infinite words $u_beta$ and $u_{-beta}$ coding the ordering of distances between consecutive $beta$- and $(-beta)$-integers. It turns out that for a class of roots $beta$ of $x^2-mx-m$, the languages coincide, while for other quadratic Pisot numbers the language of $u_beta$ can be identified only with the language of a morphic image of $u_{-beta}$. We also study the group structure of $(-beta)$-integers.","PeriodicalId":438841,"journal":{"name":"RAIRO Theor. Informatics Appl.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130298744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Freund, M. Holzer, C. Mereghetti, F. Otto, Beatrice Palano
{"title":"Special Issue: Non-Classical Models of Automata and Applications III (NCMA-2011)","authors":"R. Freund, M. Holzer, C. Mereghetti, F. Otto, Beatrice Palano","doi":"10.1051/ita/2012022","DOIUrl":"https://doi.org/10.1051/ita/2012022","url":null,"abstract":"","PeriodicalId":438841,"journal":{"name":"RAIRO Theor. Informatics Appl.","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128684925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generating Networks of Splicing Processors","authors":"J. Dassow, F. Manea, B. Truthe","doi":"10.1051/ita/2012016","DOIUrl":"https://doi.org/10.1051/ita/2012016","url":null,"abstract":"In this paper, we introduce generating networks of splicing processors (GNSP for short), a formal languages generating model related to networks of evolutionary processors and to accepting networks of splicing processors. We show that all recursively enumerable languages can be generated by GNSPs with only nine processors. We also show, by direct simulation, that two other variants of this computing model, where the communication between processors is conducted in different ways, have the same computational power.","PeriodicalId":438841,"journal":{"name":"RAIRO Theor. Informatics Appl.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134253080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Affine Parikh automata","authors":"M. Cadilhac, A. Finkel, P. McKenzie","doi":"10.1051/ita/2012013","DOIUrl":"https://doi.org/10.1051/ita/2012013","url":null,"abstract":"The Parikh finite word automaton (PA) was introduced and studied in 2003 by Klaedtke and\u0000 Rues. Natural variants of the PA arise from viewing a PA equivalently as an automaton that\u0000 keeps a count of its transitions and semilinearly constrains their numbers. Here we adopt\u0000 this view and define the affine PA , that extends the PA by having each\u0000 transition induce an affine transformation on the PA registers, and the PA on\u0000 letters , that restricts the PA by forcing any two transitions on the same\u0000 letter to affect the registers equally. Then we report on the expressiveness, closure, and\u0000 decidability properties of such PA variants. We note that deterministic PA are strictly\u0000 weaker than deterministic reversal-bounded counter machines.","PeriodicalId":438841,"journal":{"name":"RAIRO Theor. Informatics Appl.","volume":"25 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114028366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Normal forms for unary probabilistic automata","authors":"M. Bianchi, G. Pighizzini","doi":"10.1051/ITA/2012017","DOIUrl":"https://doi.org/10.1051/ITA/2012017","url":null,"abstract":"We investigate the possibility of extending Chrobak normal form to the probabilistic\u0000 case. While in the nondeterministic case a unary automaton can be simulated by an\u0000 automaton in Chrobak normal form without increasing the number of the states in the\u0000 cycles, we show that in the probabilistic case the simulation is not possible by keeping\u0000 the same number of ergodic states. This negative result is proved by considering the\u0000 natural extension to the probabilistic case of Chrobak normal form, obtained by replacing\u0000 nondeterministic choices with probabilistic choices. We then propose a different kind of\u0000 normal form, namely, cyclic normal form, which does not suffer from the same problem: we\u0000 prove that each unary probabilistic automaton can be simulated by a probabilistic\u0000 automaton in cyclic normal form, with at most the same number of ergodic states. In the\u0000 nondeterministic case there are trivial simulations between Chrobak normal form and cyclic\u0000 normal form, preserving the total number of states in the automata and in their\u0000 cycles.","PeriodicalId":438841,"journal":{"name":"RAIRO Theor. Informatics Appl.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125514417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fewest repetitions in infinite binary words","authors":"Golnaz Badkobeh, M. Crochemore","doi":"10.1051/ITA/2011109","DOIUrl":"https://doi.org/10.1051/ITA/2011109","url":null,"abstract":"A square is the concatenation of a nonempty word with itself. A word has period p if its letters at distance p match. The exponent of a nonempty word is the quotient of its length over its smallest period. In this article we give a proof of the fact that there exists an infinite binary word which contains finitely many squares and simultaneously avoids words of exponent larger than 7/3. Our infinite word contains 12 squares, which is the smallest possible number of squares to get the property, and 2 factors of exponent 7/3. These are the only factors of exponent larger than 2. The value 7/3 introduces what we call the finite-repetition threshold of the binary alphabet. We conjecture it is 7/4 for the ternary alphabet, like its repetitive threshold.","PeriodicalId":438841,"journal":{"name":"RAIRO Theor. Informatics Appl.","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115699228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Undecidability of infinite post correspondence problem for instances of size 8","authors":"Jing Dong, Qinghui Liu","doi":"10.1051/ita/2012015","DOIUrl":"https://doi.org/10.1051/ita/2012015","url":null,"abstract":"The infinite Post Correspondence Problem ( ω PCP) was shown to be undecidable by Ruohonen (1985) in general. Blondel and Canterini [ Theory Comput. Syst. 36 (2003) 231–245] showed that ω PCP is undecidable for domain alphabets of size 105, Halava and Harju [ RAIRO–Theor. Inf. Appl. 40 (2006) 551–557] showed that ω PCP is undecidable for domain alphabets of size 9. By designing a special coding, we delete a letter from Halava and Harju’s construction. So we prove that ω PCP is undecidable for domain alphabets of size 8.","PeriodicalId":438841,"journal":{"name":"RAIRO Theor. Informatics Appl.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114239497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}