-
arXiv:2406.10002 [pdf, ps, other]
An elementary proof of a universal approximation theorem
Abstract: In this short note, we give an elementary proof of a universal approximation theorem for neural networks with three hidden layers and increasing, continuous, bounded activation function. The result is weaker than the best known results, but the proof is elementary in the sense that no machinery beyond undergraduate analysis is used.
Submitted 14 June, 2024; originally announced June 2024.
-
arXiv:2109.11426 [pdf, ps, other]
Remarks on MOBS and cryptosystems using semidirect products
Abstract: Recently, several cryptosystems have been proposed based semidirect products of various algebraic structures. Efficient attacks against several of them have already been given, along with a very general attack. The purpose of this note is to provide an observation that can be used as a point-of-attack for similar systems, and show how it can be used to efficiently cryptanalyze the MOBS system.
Submitted 28 August, 2021; originally announced September 2021.
MSC Class: 94A60
-
arXiv:2012.00283 [pdf, ps, other]
A remark on MAKE -- a Matrix Action Key Exchange
Abstract: In a recent paper [arXiv:2009.00716], Rahman and Shpilrain proposed a new key-exchange protocol MAKE based on external semidirect product of groups. The purpose of this paper is to show that the key exchange protocol is insecure. We were able to break their challenge problem in under a second.
Submitted 1 December, 2020; originally announced December 2020.
-
arXiv:2005.04363 [pdf, ps, other]
Remarks on a Tropical Key Exchange System
Abstract: We consider a key-exchange protocol based on matrices over a tropical semiring which was recently proposed in \cite{grig19}. We show that a particular private parameter of that protocol can be recovered with a simple binary search, rendering it insecure.
Submitted 21 September, 2020; v1 submitted 8 May, 2020; originally announced May 2020.
-
arXiv:cs/0501017 [pdf, ps, other]
Public Key Cryptography based on Semigroup Actions
Abstract: A generalization of the original Diffie-Hellman key exchange in $(\Z/p\Z)^*$ found a new depth when Miller and Koblitz suggested that such a protocol could be used with the group over an elliptic curve. In this paper, we propose a further vast generalization where abelian semigroups act on finite sets. We define a Diffie-Hellman key exchange in this setting and we illustrate how to build interes… ▽ More
Submitted 29 October, 2007; v1 submitted 10 January, 2005; originally announced January 2005.
Comments: 20 pages. To appear in Advances in Mathematics of Communications