Skip to main content

Showing 1–5 of 5 results for author: Monico, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10002  [pdf, ps, other

    cs.LG

    An elementary proof of a universal approximation theorem

    Authors: Chris Monico

    Abstract: In this short note, we give an elementary proof of a universal approximation theorem for neural networks with three hidden layers and increasing, continuous, bounded activation function. The result is weaker than the best known results, but the proof is elementary in the sense that no machinery beyond undergraduate analysis is used.

    Submitted 14 June, 2024; originally announced June 2024.

  2. arXiv:2109.11426  [pdf, ps, other

    cs.CR

    Remarks on MOBS and cryptosystems using semidirect products

    Authors: Chris Monico

    Abstract: Recently, several cryptosystems have been proposed based semidirect products of various algebraic structures. Efficient attacks against several of them have already been given, along with a very general attack. The purpose of this note is to provide an observation that can be used as a point-of-attack for similar systems, and show how it can be used to efficiently cryptanalyze the MOBS system.

    Submitted 28 August, 2021; originally announced September 2021.

    MSC Class: 94A60

  3. arXiv:2012.00283  [pdf, ps, other

    cs.CR cs.IT

    A remark on MAKE -- a Matrix Action Key Exchange

    Authors: Chris Monico, Ayan Mahalanobis

    Abstract: In a recent paper [arXiv:2009.00716], Rahman and Shpilrain proposed a new key-exchange protocol MAKE based on external semidirect product of groups. The purpose of this paper is to show that the key exchange protocol is insecure. We were able to break their challenge problem in under a second.

    Submitted 1 December, 2020; originally announced December 2020.

  4. arXiv:2005.04363  [pdf, ps, other

    cs.CR

    Remarks on a Tropical Key Exchange System

    Authors: Dylan Rudy, Chris Monico

    Abstract: We consider a key-exchange protocol based on matrices over a tropical semiring which was recently proposed in \cite{grig19}. We show that a particular private parameter of that protocol can be recovered with a simple binary search, rendering it insecure.

    Submitted 21 September, 2020; v1 submitted 8 May, 2020; originally announced May 2020.

  5. arXiv:cs/0501017  [pdf, ps, other

    cs.CR cs.IT

    Public Key Cryptography based on Semigroup Actions

    Authors: G. Maze, C. Monico, J. Rosenthal

    Abstract: A generalization of the original Diffie-Hellman key exchange in $(\Z/p\Z)^*$ found a new depth when Miller and Koblitz suggested that such a protocol could be used with the group over an elliptic curve. In this paper, we propose a further vast generalization where abelian semigroups act on finite sets. We define a Diffie-Hellman key exchange in this setting and we illustrate how to build interes… ▽ More

    Submitted 29 October, 2007; v1 submitted 10 January, 2005; originally announced January 2005.

    Comments: 20 pages. To appear in Advances in Mathematics of Communications