• Title/Summary/Keyword: differential independence

Search Result 22, Processing Time 0.026 seconds

Monetary Policy Independence during Reversal Phases of Domestic-Foreign Interest Rate Differentials

  • Kyunghun Kim
    • East Asian Economic Review
    • /
    • v.28 no.2
    • /
    • pp.221-244
    • /
    • 2024
  • This study examines how the independence of monetary policy changes in situations where the interest rate differential between domestic and foreign rates inverts, utilizing the trilemma indices. For analysis, this paper uses the trilemma indices developed by Kim et al. (2017) to analyze the relationship between the monetary policy independence index and the other two trilemma indices, namely the capital account openness index and the exchange rate stability index, across 45 countries from 2002 to 2018. The analysis reveals that the trilemma's validity is contingent. In particular, no statistically significant negative correlation was found between the monetary policy independence index and exchange rate stability index during periods of interest rate differential inversion. A positive correlation emerges between exchange rate stability and the independence of monetary policy, particularly when the inverted interest rate differential exceeds a certain threshold. This situation, where the exchange rate remains stable despite low domestic interest rates, implies that the central bank is effectively managing monetary policy to appropriately respond to economic conditions, which is reflected in the monetary policy independence index.

Improved Differential-Linear Cryptanalysis Using DLCT (DLCT를 활용한 향상된 차분선형 분석)

  • Kim, Hyunwoo;Kim, Seonggyeom;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1379-1392
    • /
    • 2018
  • The complexity of the differential-linear cryptanalysis is strongly influenced by the probability of the differential-linear characteristic computed under the assumption of round independence, linear approximation independence, and uniformity for the trail that does not satisfy differential trail. Therefore, computing the exact probability of the differential-linear characteristic is a very important issue related to the validity of the attack. In this paper, we propose a new concept called DLCT(Differential-Linear Connectivity Table) for the differential-linear cryptanalysis. Additionally, we propose an improved probability computation technique of differential-linear characteristic by applying DLCT. By doing so, we were able to weaken linear approximation independence assumption. We reanalyzed the previous results by applying DLCT to DES and SERPENT. The probability of 7-round differential-linear characteristic of DES is $1/2+2^{-5.81}$, the probability of 9-round differential-linear characteristic of SERPENT is computed again to $1/2+2^{-57.9}$, and data complexity required for the attack is reduced by $2^{0.2}$ and $2^{2.2}$ times, respectively.

DESIGN EVALUATION OF NO SPIN DIFFERENTIAL MODELS USING THE AXIOMATIC APPROACH

  • Pyun, Y.S.;Jang, Y.D.;Cho, I.H.;Park, J.H.;Combs, A.;Lee, Y.C.
    • International Journal of Automotive Technology
    • /
    • v.7 no.5
    • /
    • pp.595-601
    • /
    • 2006
  • Two No Spin Differential(NSD) models were benchmarked for a project of Dual-Use Technology. The Axiomatic approach is utilized to evaluate the designs of the models. The Independence Axiom is satisfied at the top level of design but not at the second level, which implies the design exhibits coupling and will admit design improvements. The detailed process of design evaluation is described. It is shown that it is possible to develop a unique and evolutionary NSD design by solving the problems that cause coupling within two models.

Highly dispersive substitution box (S-box) design using chaos

  • Faheem, Zaid Bin;Ali, Asim;Khan, Muhamad Asif;Ul-Haq, Muhammad Ehatisham;Ahmad, Waqar
    • ETRI Journal
    • /
    • v.42 no.4
    • /
    • pp.619-632
    • /
    • 2020
  • Highly dispersive S-boxes are desirable in cryptosystems as nonlinear confusion sublayers for resisting modern attacks. For a near optimal cryptosystem resistant to modern cryptanalysis, a highly nonlinear and low differential probability (DP) value is required. We propose a method based on a piecewise linear chaotic map (PWLCM) with optimization conditions. Thus, the linear propagation of information in a cryptosystem appearing as a high DP during differential cryptanalysis of an S-box is minimized. While mapping from the chaotic trajectory to integer domain, a randomness test is performed that justifies the nonlinear behavior of the highly dispersive and nonlinear chaotic S-box. The proposed scheme is vetted using well-established cryptographic performance criteria. The proposed S-box meets the cryptographic performance criteria and further minimizes the differential propagation justified by the low DP value. The suitability of the proposed S-box is also tested using an image encryption algorithm. Results show that the proposed S-box as a confusion component entails a high level of security and improves resistance against all known attacks.

EVOLUTIONARY DESIGN OF NO SPIN DIFFERENTIAL MODELS FOR OFF-ROAD VEHICLES USING THE AXIOMATIC APPROACH

  • Pyun, Y.S;Jang, Y.D.;Cho, I.H.;Park, J.H.;Combs, A.;Lee, Y.C.
    • International Journal of Automotive Technology
    • /
    • v.7 no.7
    • /
    • pp.795-801
    • /
    • 2006
  • A No Spin Differential (NSD) design has been improved from evaluation of two NSD models utilizing the axiomatic approach. New design parameters of the second level are developed to satisfy the independence axiom. The design matrices are determined to decouple the relationship between design parameters and process parameters. The values of process parameters are then determined to optimize and improve the NSD design. Consequently a unique and evolutionary NSD design is achieved with the aid of the axiomatic approach.

RESULTS ON THE ALGEBRAIC DIFFERENTIAL INDEPENDENCE OF THE RIEMANN ZETA FUNCTION AND THE EULER GAMMA FUNCTION

  • Xiao-Min Li;Yi-Xuan Li
    • Bulletin of the Korean Mathematical Society
    • /
    • v.60 no.6
    • /
    • pp.1651-1672
    • /
    • 2023
  • In 2010, Li-Ye [13, Theorem 0.1] proved that P(ζ(z), ζ'(z), . . . , ζ(m)(z), Γ(z), Γ'(z), Γ"(z)) ≢ 0 in ℂ, where m is a non-negative integer, and P(u0, u1, . . . , um, v0, v1, v2) is any non-trivial polynomial in its arguments with coefficients in the field ℂ. Later on, Li-Ye [15, Theorem 1] proved that P(z, Γ(z), Γ'(z), . . . , Γ(n)(z), ζ(z)) ≢ 0 in z ∈ ℂ for any non-trivial distinguished polynomial P(z, u0, u1, . . ., un, v) with coefficients in a set Lδ of the zero function and a class of nonzero functions f from ℂ to ℂ ∪ {∞} (cf. [15, Definition 1]). In this paper, we prove that P(z, ζ(z), ζ'(z), . . . , ζ(m)(z), Γ(z), Γ'(z), . . . , Γ(n)(z)) ≢ 0 in z ∈ ℂ, where m and n are two non-negative integers, and P(z, u0, u1, . . . , um, v0, v1, . . . , vn) is any non-trivial polynomial in the m + n + 2 variables u0, u1, . . . , um, v0, v1, . . . , vn with coefficients being meromorphic functions of order less than one, and the polynomial P(z, u0, u1, . . . , um, v0, v1, . . . , vn) is a distinguished polynomial in the n + 1 variables v0, v1, . . . , vn. The question studied in this paper is concerning the conjecture of Markus from [16]. The main results obtained in this paper also extend the corresponding results from Li-Ye [12] and improve the corresponding results from Chen-Wang [5] and Wang-Li-Liu-Li [23], respectively.

Gene Microarray Assessment of Multiple Genes and Signal Pathways Involved in Androgen-dependent Prostate Cancer Becoming Androgen Independent

  • Liu, Jun-Bao;Dai, Chun-Mei;Su, Xiao-Yun;Cao, Lu;Qin, Rui;Kong, Qing-Bo
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.22
    • /
    • pp.9791-9795
    • /
    • 2014
  • To study the gene expression change and possible signal pathway during androgen-dependent prostate cancer (ADPC) becoming androgen-independent prostate cancer (AIPC), an LNCaP cell model of AIPC was established using flutamide in combination with androgen-free environment inducement, and differential expression genes were screened by microarray. Then the biological process, molecular function and KEGG pathway of differential expression genes are analyzed by Molecule Annotation System (MAS). By comparison of 12,207 expression genes, 347 expression genes were acquired, of which 156 were up-ragulated and 191 down-regulated. After analyzing the biological process and molecule function of differential expression genes, these genes are found to play crucial roles in cell proliferation, differntiation, cell cycle control, protein metabolism and modification and other biological process, serve as signal molecules, enzymes, peptide hormones, cytokines, cytoskeletal proteins and adhesion molecules. The analysis of KEGG show that the relevant genes of AIPC transformation participate in glutathione metabolism, cell cycle, P53 signal pathway, cytochrome P450 metabolism, Hedgehog signal pathway, MAPK signal pathway, adipocytokines signal pathway, PPAR signal pathway, TGF-${\beta}$ signal pathway and JAK-STAT signal pathway. In conclusion, during the process of ADPC becoming AIPC, it is not only one specific gene or pathway, but multiple genes and pathways that change. The findings above lay the foundation for study of AIPC mechanism and development of AIPC targeting drugs.

The Influence of the Factors on Learner Satisfaction by field-independence Learning Style in e-Learning Environment (e-Learning 환경에서 상황 독립적 학습자들의 학습 만족도에 영향을 미치는 요인에 관한 연구)

  • Park, Jong Soon;Ko, Young Gi;Lee, Jong Man
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.1
    • /
    • pp.105-117
    • /
    • 2008
  • T Abstract This study investigates the influence of differential factors on learner satisfaction by field-independent learning style in e-learning. Most of data were collected from students. Participants were classified based on a learning style typology (field-independent/dependent) and, then, analyzed was the influence of key factors on learner satisfaction using multiple regression analysis. This study suggests that e-Learning service providers need to differentiate learners based on learning style in order to improve learner satisfaction. Specially, Field independent learners are more likely to be satisfied by the teacher's provide degree of joyful, degree of contents, degree of learning control pacing, ability of problem solving and consistency.

Performance Improvement of Fuzzy C-Means Clustering Algorithm by Optimized Early Stopping for Inhomogeneous Datasets

  • Chae-Rim Han;Sun-Jin Lee;Il-Gu Lee
    • Journal of information and communication convergence engineering
    • /
    • v.21 no.3
    • /
    • pp.198-207
    • /
    • 2023
  • Responding to changes in artificial intelligence models and the data environment is crucial for increasing data-learning accuracy and inference stability of industrial applications. A learning model that is overfitted to specific training data leads to poor learning performance and a deterioration in flexibility. Therefore, an early stopping technique is used to stop learning at an appropriate time. However, this technique does not consider the homogeneity and independence of the data collected by heterogeneous nodes in a differential network environment, thus resulting in low learning accuracy and degradation of system performance. In this study, the generalization performance of neural networks is maximized, whereas the effect of the homogeneity of datasets is minimized by achieving an accuracy of 99.7%. This corresponds to a decrease in delay time by a factor of 2.33 and improvement in performance by a factor of 2.5 compared with the conventional method.

A novel framework for the construction of cryptographically secure S-boxes

  • Razi Arshad;Mudassir Jalil;Muzamal Hussain;Abdelouahed Tounsi
    • Computers and Concrete
    • /
    • v.34 no.1
    • /
    • pp.79-91
    • /
    • 2024
  • In symmetric cryptography, a cryptographically secure Substitution-Box (S-Box) is a key component of a block cipher. S-Box adds a confusion layer in block ciphers that provide resistance against well-known attacks. The generation of a cryptographically secure S-Box depends upon its generation mechanism. In this paper, we propose a novel framework for the construction of cryptographically secure S-Boxes. This framework uses a combination of linear fractional transformation and permutation functions. S-Boxes security is analyzed against well-known security criteria that include nonlinearity, bijectiveness, strict avalanche and bits independence criteria, linear and differential approximation probability. The S-Boxes can be used in the encryption of any grayscale digital images. The encrypted images are analyzed against well-known image analysis criteria that include pixel changing rates, correlation, entropy, and average change of intensity. The analysis of the encrypted image shows that our image encryption scheme is secure.