Paul Putter - Academia.edu (original) (raw)
Uploads
Papers by Paul Putter
This paper discusses the use of an arbitrary bit-sequence generating algorithm as the cryptograph... more This paper discusses the use of an arbitrary bit-sequence generating algorithm as the cryptographic key for a stream cipher. Emphasis is placed on methods for combining stream generators into more complex ones, with and without randomization. Threshold schemes give a generalization of many combination techniques.
ZAMM - Zeitschrift für Angewandte Mathematik und Mechanik, 1959
Es wird ein numerisches Verfahren beschrieben, um das Naximum einer Funktion zu finden, wenn als ... more Es wird ein numerisches Verfahren beschrieben, um das Naximum einer Funktion zu finden, wenn als Nebenbedingungen sowohl Gleichungen als auch Ungleichungen vorliegen. Das Wesen des Verfahrens liegt darin, einen Punkt unter Beriicksichtigung der Nebenbedingungen in Richtung des Cradienten der Funktion, deren Maximum gesucht wird, zu verschieben. Das Verfahren wurde bereits fiir den Rechenautomaten I B M 650 programmiert und hat sich bisher gut bewahrt. A numerical method i s described for finding the maximum of a given function under a set of supplementary conditions containing both equations and inequalities. The essence of the method consists in displacing a point in the direction of the gradient of the given function in such a way that the supplementary conditions are satisfied. The method has already been used for programming on. the autom,atic computer I B M 650 and has been found to work very satisfactorily. On dkcrit un prockdt! numkrique afin de trouver le maximum d'une fonction s i des kquations aussi bien que des inkgalitds sont prksentes en tant que conditions secondaires. La nature de ce procddd est de ddplacer un pointen considdrant les conditions secondaireadans la direction du gradient de la fonction dont le maximum est recherchk. Ce proddt! a dkjd dtt! prdpard pour le calculateur automatique I B M 650 et a bien rkpondu b l'attente juspu'ici. OnHcbisaeTcn smJreHHMfi MeTon nnn onpeneneHm MaKcmyMa #YHKU~IK B caygae, KorAa B Haseeme fionoJrbxHmenbHhlx yc~rosai m e m c n KaH ypaBHemR TaK EZ Hepasemma. CyuHocTb npHeMa COCTOHT B nepenswmemw T O~K E Z B HanpasaeHm rpanaewa TO^ @ynIiqm, MaxcmyM ~o~o p o i ~p e b y e~c n Haim, npHseM ~p e 6 y e~c~ c o 6 n m n e~~e nonommenbHbrx ycnon&i. TOT MeTon 6brn s a n p o r p a~~~p o s a~ ~J I R 6wcTponeiicmyIoqei4 anewpomoi3 sbiwcnmenbHo8 MaLUHHbI TkIIIa Z/IEM 650 M HaJI yROBJIeTBOpHTeJIbHbIe pe3yJlbTaTbI.
Proceedings of 1993 Ieee 1st International Workshop on Systems Management, Apr 14, 1993
Journal of Atmospheric and Terrestrial Physics, 1956
1986 IEEE Symposium on Security and Privacy, 1986
Lecture Notes in Computer Science, 2000
Lecture Notes in Computer Science, 1986
The dynamic basic equations of a statistical plasma theory were derived. ; It was assumed that th... more The dynamic basic equations of a statistical plasma theory were derived. ; It was assumed that the plasma consisted of electrons, ponitive ions, and a ; neutral gas. The basic equations consist of a series of partial differertial ; equations by which the behavior of the plasma in local and momentum space is ; defined. An extension of the theory to the case where varing kinds of ions or ; neutral gas are present is possible without difficulty. Various assumptions must ; be introduced to conflne the theory, which is exact, to the region of its ; applicability. Symmetry of the particles was assumed, and it was further assumed ; that all processes conformed to the laws of classical physics. Therefore, ; ionization, recombination, and the excitation of degrees of freedomn are excluded. ; The fields carried by the charge carrier were obtained by power development from ; 1/c by means of fields derived from the Wiechert potential. Cnly the first ; member was considened in the electric and m...
Communications of the ACM, 1989
Communications of the ACM, 1989
This paper discusses the use of an arbitrary bit-sequence generating algorithm as the cryptograph... more This paper discusses the use of an arbitrary bit-sequence generating algorithm as the cryptographic key for a stream cipher. Emphasis is placed on methods for combining stream generators into more complex ones, with and without randomization. Threshold schemes give a generalization of many combination techniques.
ZAMM - Zeitschrift für Angewandte Mathematik und Mechanik, 1959
Es wird ein numerisches Verfahren beschrieben, um das Naximum einer Funktion zu finden, wenn als ... more Es wird ein numerisches Verfahren beschrieben, um das Naximum einer Funktion zu finden, wenn als Nebenbedingungen sowohl Gleichungen als auch Ungleichungen vorliegen. Das Wesen des Verfahrens liegt darin, einen Punkt unter Beriicksichtigung der Nebenbedingungen in Richtung des Cradienten der Funktion, deren Maximum gesucht wird, zu verschieben. Das Verfahren wurde bereits fiir den Rechenautomaten I B M 650 programmiert und hat sich bisher gut bewahrt. A numerical method i s described for finding the maximum of a given function under a set of supplementary conditions containing both equations and inequalities. The essence of the method consists in displacing a point in the direction of the gradient of the given function in such a way that the supplementary conditions are satisfied. The method has already been used for programming on. the autom,atic computer I B M 650 and has been found to work very satisfactorily. On dkcrit un prockdt! numkrique afin de trouver le maximum d'une fonction s i des kquations aussi bien que des inkgalitds sont prksentes en tant que conditions secondaires. La nature de ce procddd est de ddplacer un pointen considdrant les conditions secondaireadans la direction du gradient de la fonction dont le maximum est recherchk. Ce proddt! a dkjd dtt! prdpard pour le calculateur automatique I B M 650 et a bien rkpondu b l'attente juspu'ici. OnHcbisaeTcn smJreHHMfi MeTon nnn onpeneneHm MaKcmyMa #YHKU~IK B caygae, KorAa B Haseeme fionoJrbxHmenbHhlx yc~rosai m e m c n KaH ypaBHemR TaK EZ Hepasemma. CyuHocTb npHeMa COCTOHT B nepenswmemw T O~K E Z B HanpasaeHm rpanaewa TO^ @ynIiqm, MaxcmyM ~o~o p o i ~p e b y e~c n Haim, npHseM ~p e 6 y e~c~ c o 6 n m n e~~e nonommenbHbrx ycnon&i. TOT MeTon 6brn s a n p o r p a~~~p o s a~ ~J I R 6wcTponeiicmyIoqei4 anewpomoi3 sbiwcnmenbHo8 MaLUHHbI TkIIIa Z/IEM 650 M HaJI yROBJIeTBOpHTeJIbHbIe pe3yJlbTaTbI.
Proceedings of 1993 Ieee 1st International Workshop on Systems Management, Apr 14, 1993
Journal of Atmospheric and Terrestrial Physics, 1956
1986 IEEE Symposium on Security and Privacy, 1986
Lecture Notes in Computer Science, 2000
Lecture Notes in Computer Science, 1986
The dynamic basic equations of a statistical plasma theory were derived. ; It was assumed that th... more The dynamic basic equations of a statistical plasma theory were derived. ; It was assumed that the plasma consisted of electrons, ponitive ions, and a ; neutral gas. The basic equations consist of a series of partial differertial ; equations by which the behavior of the plasma in local and momentum space is ; defined. An extension of the theory to the case where varing kinds of ions or ; neutral gas are present is possible without difficulty. Various assumptions must ; be introduced to conflne the theory, which is exact, to the region of its ; applicability. Symmetry of the particles was assumed, and it was further assumed ; that all processes conformed to the laws of classical physics. Therefore, ; ionization, recombination, and the excitation of degrees of freedomn are excluded. ; The fields carried by the charge carrier were obtained by power development from ; 1/c by means of fields derived from the Wiechert potential. Cnly the first ; member was considened in the electric and m...
Communications of the ACM, 1989
Communications of the ACM, 1989