Academia.eduAcademia.edu

Finite Precision

description10 papers
group0 followers
lightbulbAbout this topic
Finite precision refers to the limitation in representing numbers in computational systems due to a fixed number of digits or bits. This constraint affects calculations and data storage, leading to rounding errors and loss of accuracy in numerical computations, particularly in fields such as computer science, numerical analysis, and engineering.
lightbulbAbout this topic
Finite precision refers to the limitation in representing numbers in computational systems due to a fixed number of digits or bits. This constraint affects calculations and data storage, leading to rounding errors and loss of accuracy in numerical computations, particularly in fields such as computer science, numerical analysis, and engineering.
This paper proposes a new Least Mean Square (LMS) based algorithm aimed for acoustic echo cancellation. The algorithm is an elaboration of an existing algorithm developed for the Konftel 200 conference phone. The purpose of the algorithm... more
This paper presents an analysis of the effects of noise and precision on a simplified model of the clarinet driven by a variable control parameter. When the control parameter is varied the clarinet model undergoes a dynamic bifurcation. A... more
In this paper we investigate the degradation of the statistic properties of chaotic maps as consequence of their implementation in a digital media such as Digital Signal Processors (DSP), Field Programmable Gate Arrays (FPGA) or... more
In this paper we investigate the degradation of the statistic properties of chaotic maps as consequence of their implementation in a digital media such as Digital Signal Processors (DSP), Field Programmable Gate Arrays (FPGA) or... more
In this work we comment some conclusions derived from the analysis of recent proposals in the field of chaos-based cryptography. These observations remark a number of major problems detected in some of those schemes under examination.... more
This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaotic maps. It is shown how to obtain the secret key using a chosen-ciphertext attack. Some other design weaknesses are also shown.
This paper deals with a family of interesting 2 D-quadratic maps proposed by Sprott, in his seminal paper [1], related to "chaotic art". Our main interest about these maps is their great potential for using them in digital electronic... more
This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaotic maps. It is shown how to obtain the secret key using a chosenciphertext attack. Some other design weaknesses are also shown.
by Gonzalo Alvarez and 
1 more
This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaotic maps. It is shown how to obtain the secret key using a chosenciphertext attack. Some other design weaknesses are also shown.
these are excerpts from the Arabic version of the Secretum Secretorum, the سر الاسرار. In it there are sequences written in a different script, assumedly on talismans and alchemy. If anyone can help with reading these, I'd be most grateful.
This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaotic maps. It is shown how to obtain the secret key using a chosen-ciphertext attack. Some other design weaknesses are also shown.
Download research papers for free!