RFID Authentication and Time-Memory Trade-Offs

Total Page:16

File Type:pdf, Size:1020Kb

RFID Authentication and Time-Memory Trade-Offs RFID Authentication and Time-Memory Trade-offs Xavier Carpent Thesis submitted in partial fulfillment of the requirements for the Degree of Doctor in Engineering Sciences March 18, 2015 Institute of Information and Communication Technologies, Electronics and Applied Mathematics (ICTEAM) Louvain School of Engineering (EPL) Universit´ecatholique de Louvain (UCL) Louvain-la-Neuve Belgium Examining board Prof. Gildas Avoine, Supervisor UCL, Belgium Prof. Olivier Periera, Secretary UCL, Belgium Prof. Olivier Markowitch ULB, Belgium Prof. Bart Preneel KUL, Belgium Dr. Philippe Oechslin EPFL, Switzerland Prof. Peter Van Roy, Chair UCL/, Belgium Abstract Two areas have been explored during this thesis: RFID authentication, and cryptanalytic time- memory tradeoffs. Radio Frequency IDentification (or RFID) is a technology that allows identification and authen- tication of objects or persons through the use of wireless communication between tags and readers. RFID Tags are small devices that are comprised of an antenna (for receiving/transmitting data) and a chip. Although exceptions exist (e.g. passports, etc.), tags are generally inexpensive and moderately powerful in terms of computation, and most of the time rely on the electro-magnetic field provided by the reader for energy supply. Readers on the other hand are more expensive devices that have a computational power comparable to a PC. The RFID technology is very widespread nowadays, and it continues to grow rapidly. However, due to the high requirements (secure authentication, respect of privacy, speed of authentication, etc.) and specific constraints (asymmetric system, inexpensive tags, wireless communication, etc.), there are many challenges regarding its security. Mostly two have been studied in this thesis: ultralightweight authentication (authentication protocols dedicated to extremely low-end tags where classical crypto is deemed too expensive) and the complexity/privacy tradeoff (protecting privacy makes the task of read- ers very time-consuming). In the former, our results are mostly cryptanalytic, and in the latter where, it seems, no perfect solution exists, our results are mainly analytical and comparative (the OSK/AO protocol in particular achieves good privacy protection with reasonable complexity, and uses cryptanalytic time-memory tradeoffs that is the focus of the second part of the thesis). A cryptanalytic time-memory tradeoff is a generic tool to carry out brute force search for the pre-image of a one-way function efficiently. It forms a compromise between the online exhaustive search (no precomputation, searching through all the possibilities) and the lookup table (all pos- sibilities precomputed and stored, and then looking up when needed) approaches. In the former, no precomputation or memory is required, but the search is expensive, and in the latter, precom- putation and storage are expensive, but the search is nearly instant. In time-memory tradeoffs, precomputation is expensive, but both storage and online search time are reasonable. In this thesis, ways to improve the performance of existing techniques have been explored, among which finger- prints (in which stored information is slightly different than in classical time-memory tradeoffs, which results in a speedup in the online phase), storage optimization (which reduce the storage of time-memory tradeoffs), and interleaving (which is a way to accommodate the technique to non-uniformly distributed input). 3 4 Contents 1 Introduction 11 1.1 RFID in a Nutshell . 11 1.1.1 System Model . 11 1.1.2 Threats in RFID . 12 1.1.3 Challenges in RFID Authentication . 13 1.2 Results on RFID Authentication . 14 1.3 Introduction to Cryptanalytic Time-Memory Trade-offs . 15 1.3.1 Motivation . 15 1.3.2 Variants and Adaptations . 16 1.4 Results on Time-Memory Trade-offs . 16 1.5 Plan of the Manuscript . 17 2 Ultralightweight Authentication 19 2.1 Ultralightweight Protocols . 20 2.1.1 Tag Capabilities . 20 2.1.2 Attack Model . 20 2.1.3 SASI, a Typical Ultralightweight Protocol . 21 2.2 Statistics on the State of the Art . 29 2.3 Common Flaws . 31 2.3.1 Linearity and T-functions . 31 2.3.2 Biased Output . 32 2.3.3 Rotations . 33 2.3.4 Message Composition . 34 2.3.5 Knowledge Accumulation . 34 2.3.6 Desynchronization . 35 2.3.7 Vulnerability to Systematic Black-box Attacks . 35 2.4 Dubious Proofs of Security . 38 2.4.1 Randomness Tests . 38 2.4.2 BAN and GNY Logic . 40 2.4.3 Other Approaches . 41 2.5 Weaknesses in Recent Protocols . 41 2.5.1 Bilal and Martin . 41 2.5.2 Jeon and Yoon . 42 2.5.3 Ling and Shen . 44 2.6 Ultralightweight Building Blocks . 44 2.7 Conclusion . 45 3 Complexity and Privacy 47 3.1 Preliminaries . 47 3.2 Protocols with Limited Privacy . 49 3.3 Protocols with Shared Secrets . 50 3.3.1 Tree-based and Group-based Protocols . 50 3.3.2 Cheon, Hong, and Tsudik's Protocol . 51 3.3.3 Alomair, Clark, Cuellar, and Poovendran's Protocol . 55 5 6 Contents 3.3.4 Discussion . 57 3.4 Protocols Based on Hash-Chains . 57 3.4.1 OSK Protocol . 57 3.4.2 OSK/AO Protocol . 58 3.4.3 OSK/BF Protocol . 59 3.4.4 O-RAP Protocol . 60 3.4.5 Discussion . 61 3.5 Counter-Based Protocols . 61 3.5.1 YA-TRAP Family . 61 3.5.2 Discussion . 63 3.6 Comparison . 63 3.7 Conclusion . 66 4 The OSK/AO Protocol 67 4.1 Ohkubo, Suzuki, and Kinoshita's Protocol . 67 4.1.1 Description . 67 4.1.2 Real-life Applications . 69 4.2 OSK/AO . 70 4.2.1 Description . 70 4.2.2 Analysis . 70 4.2.3 Algorithms . 71 4.3 Experiments and Comparison . 73 4.3.1 Environment . 73 4.3.2 Parameters and Functions . 74 4.3.3 Precomputation of the Tables . 74 4.3.4 Experiments . 75 4.4 Conclusion . 75 5 Rainbow Tables with Fingerprints 77 5.1 Background on Cryptanalytic Time-Memory Trade-offs . 77 5.1.1 Hellman Tables . 77 5.1.2 Rainbow Tables . 78 5.1.3 Main Results on Rainbow Tables . 80 5.2 Fingerprints . 80 5.2.1 Rationale . 81 5.2.2 Description . 81 5.3 Analysis . 82 5.4 Algorithm for Finding Optimal Configurations . 86 5.4.1 Hill Climbing . 86 5.4.2 Application to Checkpoint Functions . 87 5.5 Theoretical and Experimental Results . 88 5.5.1 Theoretical Results . 88 5.5.2 Experimental Validation . 89 5.6 Conclusion . 90 6 Rainbow Tables Optimal Storage 91 6.1 Bound for Endpoint Storage . 91 6.2 Decomposition of the Endpoints in Prefix and Suffix . 92 6.2.1 Description . 92 6.2.2 Analysis and Optimality . 93 6.3 Compressed Delta Encoding of the Endpoints . 94 6.3.1 Description . 94 6.3.2 Analysis and Optimality . ..
Recommended publications
  • Communications of the Acm
    COMMUNICATIONS CACM.ACM.ORG OF THEACM 11/2014 VOL.57 NO.11 Scene Understanding by Labeling Pixels Evolution of the Product Manager The Data on Diversity On Facebook, Most Ties Are Weak Keeping Online Reviews Honest Association for Computing Machinery tvx-full-page.pdf-newest.pdf 1 11/10/2013 12:03 3-5 JUNE, 2015 BRUSSELS, BELGIUM Course and Workshop C proposals by M 15 November 2014 Y CM Paper Submissions by MY 12 January 2015 CY CMY K Work in Progress, Demos, DC, & Industrial Submissions by 2 March 2015 Welcoming Submissions on Content Production Systems & Infrastructures Devices & Interaction Techniques Experience Design & Evaluation Media Studies Data Science & Recommendations Business Models & Marketing Innovative Concepts & Media Art TVX2015.COM [email protected] ACM Books M MORGAN& CLAYPOOL &C PUBLISHERS Publish your next book in the ACM Digital Library ACM Books is a new series of advanced level books for the computer science community, published by ACM in collaboration with Morgan & Claypool Publishers. I’m pleased that ACM Books is directed by a volunteer organization headed by a dynamic, informed, energetic, visionary Editor-in-Chief (Tamer Özsu), working closely with a forward-looking publisher (Morgan and Claypool). —Richard Snodgrass, University of Arizona books.acm.org ACM Books ◆ will include books from across the entire spectrum of computer science subject matter and will appeal to computing practitioners, researchers, educators, and students. ◆ will publish graduate level texts; research monographs/overviews of established and emerging fields; practitioner-level professional books; and books devoted to the history and social impact of computing. ◆ will be quickly and attractively published as ebooks and print volumes at affordable prices, and widely distributed in both print and digital formats through booksellers and to libraries and individual ACM members via the ACM Digital Library platform.
    [Show full text]
  • Benchmarks for IP Forwarding Tables
    Reviewers James Abello Richard Cleve Vassos Hadzilacos Dimitris Achilioptas James Clippinger Jim Hafner Micah Adler Anne Condon Torben Hagerup Oswin Aichholzer Stephen Cook Armin Haken William Aiello Tom Cormen Shai Halevi Donald Aingworth Dan Dooly Eric Hansen Susanne Albers Oliver Duschka Refael Hassin Eric Allender Martin Dyer Johan Hastad Rajeev Alur Ran El-Yaniv Lisa Hellerstein Andris Ambainis David Eppstein Monika Henzinger Amihood Amir Jeff Erickson Tom Henzinger Artur Andrzejak Kousha Etessami Jeremy Horwitz Boris Aronov Will Evans Russell Impagliazzo Sanjeev Arora Guy Even Piotr Indyk Amotz Barnoy Ron Fagin Sandra Irani Yair Bartal Michalis Faloutsos Ken Jackson Julien Basch Martin Farach-Colton David Johnson Saugata Basu Uri Feige John Jozwiak Bob Beals Joan Feigenbaum Bala Kalyandasundaram Paul Beame Stefan Felsner Ming-Yang Kao Steve Bellantoni Faith Fich Haim Kaplan Micahel Ben-Or Andy Fingerhut Bruce Kapron Josh Benaloh Paul Fischer Michael Kaufmann Charles Bennett Lance Fortnow Michael Kearns Marshall Bern Steve Fortune Sanjeev Khanna Nikolaj Bjorner Alan Frieze Samir Khuller Johannes Blomer Anna Gal Joe Kilian Avrim Blum Naveen Garg Valerie King Dan Boneh Bernd Gartner Philip Klein Andrei Broder Rosario Gennaro Spyros Kontogiannis Nader Bshouty Ashish Goel Gilad Koren Adam Buchsbaum Michel Goemans Dexter Kozen Lynn Burroughs Leslie Goldberg Dina Kravets Ran Canetti Paul Goldberg S. Ravi Kumar Pei Cao Oded Goldreich Eyal Kushilevitz Moses Charikar John Gray Stephen Kwek Chandra Chekuri Dan Greene Larry Larmore Yi-Jen Chiang
    [Show full text]
  • Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University
    Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University. Linda A. Cicero/Stanford News Service. Whitfield Diffie Martin E. Hellman ernment–private sector relations, and attracts billions of Whitfield Diffie, former chief security officer of Sun Mi- dollars in research and development,” said ACM President crosystems, and Martin E. Hellman, professor emeritus Alexander L. Wolf. “In 1976, Diffie and Hellman imagined of electrical engineering at Stanford University, have been a future where people would regularly communicate awarded the 2015 A. M. Turing Award of the Association through electronic networks and be vulnerable to having for Computing Machinery for their critical contributions their communications stolen or altered. Now, after nearly to modern cryptography. forty years, we see that their forecasts were remarkably Citation prescient.” The ability for two parties to use encryption to commu- “Public-key cryptography is fundamental for our indus- nicate privately over an otherwise insecure channel is try,” said Andrei Broder, Google Distinguished Scientist. fundamental for billions of people around the world. On “The ability to protect private data rests on protocols for a daily basis, individuals establish secure online connec- confirming an owner’s identity and for ensuring the integ- tions with banks, e-commerce sites, email servers, and the rity and confidentiality of communications. These widely cloud. Diffie and Hellman’s groundbreaking 1976 paper, used protocols were made possible through the ideas and “New Directions in Cryptography,” introduced the ideas of methods pioneered by Diffie and Hellman.” public-key cryptography and digital signatures, which are Cryptography is a practice that facilitates communi- the foundation for most regularly used security protocols cation between two parties so that the communication on the Internet today.
    [Show full text]
  • Communications of the Acm
    COMMUNICATIONS CACM.ACM.ORG OF THEACM 10/2015 VOL.58 NO.10 Discovering Genes Involved in Disease and the Mystery of Missing Heritability Crash Consistency Concerns Rise about AI Seeking Anonymity in an Internet Panopticon What Can Be Done about Gender Diversity in Computing? A Lot! Association for Computing Machinery Previous A.M. Turing Award Recipients 1966 A.J. Perlis 1967 Maurice Wilkes 1968 R.W. Hamming 1969 Marvin Minsky 1970 J.H. Wilkinson 1971 John McCarthy 1972 E.W. Dijkstra 1973 Charles Bachman 1974 Donald Knuth 1975 Allen Newell 1975 Herbert Simon 1976 Michael Rabin 1976 Dana Scott 1977 John Backus ACM A.M. TURING AWARD 1978 Robert Floyd 1979 Kenneth Iverson 1980 C.A.R Hoare NOMINATIONS SOLICITED 1981 Edgar Codd 1982 Stephen Cook Nominations are invited for the 2015 ACM A.M. Turing Award. 1983 Ken Thompson 1983 Dennis Ritchie This is ACM’s oldest and most prestigious award and is presented 1984 Niklaus Wirth annually for major contributions of lasting importance to computing. 1985 Richard Karp 1986 John Hopcroft Although the long-term influences of the nominee’s work are taken 1986 Robert Tarjan into consideration, there should be a particular outstanding and 1987 John Cocke 1988 Ivan Sutherland trendsetting technical achievement that constitutes the principal 1989 William Kahan claim to the award. The recipient presents an address at an ACM event 1990 Fernando Corbató 1991 Robin Milner that will be published in an ACM journal. The award is accompanied 1992 Butler Lampson by a prize of $1,000,000. Financial support for the award is provided 1993 Juris Hartmanis 1993 Richard Stearns by Google Inc.
    [Show full text]
  • Stal Aanderaa Hao Wang Lars Aarvik Martin Abadi Zohar Manna James
    Don Heller J. von zur Gathen Rodney Howell Mark Buckingham Moshe VardiHagit Attiya Raymond Greenlaw Henry Foley Tak-Wah Lam Chul KimEitan Gurari Jerrold W. GrossmanM. Kifer J.F. Traub Brian Leininger Martin Golumbic Amotz Bar-Noy Volker Strassen Catriel Beeri Prabhakar Raghavan Louis E. Rosier Daniel M. Kan Danny Dolev Larry Ruzzo Bala Ravikumar Hsu-Chun Yen David Eppstein Herve Gallaire Clark Thomborson Rajeev Raman Miriam Balaban Arthur Werschulz Stuart Haber Amir Ben-Amram Hui Wang Oscar H. Ibarra Samuel Eilenberg Jim Gray Jik Chang Vardi Amdursky H.T. Kung Konrad Jacobs William Bultman Jacob Gonczarowski Tao Jiang Orli Waarts Richard ColePaul Dietz Zvi Galil Vivek Gore Arnaldo V. Moura Daniel Cohen Kunsoo Park Raffaele Giancarlo Qi Zheng Eli Shamir James Thatcher Cathy McGeoch Clark Thompson Sam Kim Karol Borsuk G.M. Baudet Steve Fortune Michael Harrison Julius Plucker NicholasMichael Tran Palis Daniel Lehmann Wilhelm MaakMartin Dietzfelbinger Arthur Banks Wolfgang Maass Kimberly King Dan Gordon Shafee Give'on Jean Musinski Eric Allender Pino Italiano Serge Plotkin Anil Kamath Jeanette Schmidt-Prozan Moti Yung Amiram Yehudai Felix Klein Joseph Naor John H. Holland Donald Stanat Jon Bentley Trudy Weibel Stefan Mazurkiewicz Daniela Rus Walter Kirchherr Harvey Garner Erich Hecke Martin Strauss Shalom Tsur Ivan Havel Marc Snir John Hopcroft E.F. Codd Chandrajit Bajaj Eli Upfal Guy Blelloch T.K. Dey Ferdinand Lindemann Matt GellerJohn Beatty Bernhard Zeigler James Wyllie Kurt Schutte Norman Scott Ogden Rood Karl Lieberherr Waclaw Sierpinski Carl V. Page Ronald Greenberg Erwin Engeler Robert Millikan Al Aho Richard Courant Fred Kruher W.R. Ham Jim Driscoll David Hilbert Lloyd Devore Shmuel Agmon Charles E.
    [Show full text]
  • In Defense of Minhash Over Simhash
    In Defense of MinHash Over SimHash Anshumali Shrivastava Ping Li Department of Computer Science Department of Statistics and Biostatistics Computing and Information Science Department of Computer Science Cornell University, Ithaca, NY, USA Rutgers University, Piscataway, NJ, USA Abstract 1 Introduction MinHash and SimHash are the two widely The advent of the Internet has led to generation of adopted Locality Sensitive Hashing (LSH) al- massive and inherently high dimensional data. In gorithms for large-scale data processing ap- many industrial applications, the size of the datasets plications. Deciding which LSH to use for has long exceeded the memory capacity of a single a particular problem at hand is an impor- machine. In web domains, it is not difficult to find tant question, which has no clear answer in datasets with the number of instances and the num- the existing literature. In this study, we pro- ber of dimensions going into billions [1, 6, 28]. vide a theoretical answer (validated by exper- iments) that MinHash virtually always out- The reality that web data are typically sparse and high performs SimHash when the data are binary, dimensional is due to the wide adoption of the “Bag as common in practice such as search. of Words” (BoW) representations for documents and images. In BoW representations, it is known that the The collision probability of MinHash is a word frequency within a document follows power law. function of resemblance similarity ( ), while Most of the words occur rarely in a document and most the collision probability of SimHashR is a func- of the higher order shingles in the document occur only tion of cosine similarity ( ).
    [Show full text]
  • Contents U U U
    Contents u u u ACM Awards Reception and Banquet, June 2018 .................................................. 2 Introduction ......................................................................................................................... 3 A.M. Turing Award .............................................................................................................. 4 ACM Prize in Computing ................................................................................................. 5 ACM Charles P. “Chuck” Thacker Breakthrough in Computing Award ............. 6 ACM – AAAI Allen Newell Award .................................................................................. 7 Software System Award ................................................................................................... 8 Grace Murray Hopper Award ......................................................................................... 9 Paris Kanellakis Theory and Practice Award ...........................................................10 Karl V. Karlstrom Outstanding Educator Award .....................................................11 Eugene L. Lawler Award for Humanitarian Contributions within Computer Science and Informatics ..........................................................12 Distinguished Service Award .......................................................................................13 ACM Athena Lecturer Award ........................................................................................14 Outstanding Contribution
    [Show full text]
  • Adaptive Approximate State Storage
    Adaptive Approximate State Storage A dissertation presented by Peter C. Dillinger to the Faculty of the Graduate School of the College of Computer and Information Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy Northeastern University Boston, Massachusetts December, 2010 Acknowledgments I can only begin to thank all who have helped me in completing this Ph.D. I especially thank my advisor, Panagiotis (Pete) Manolios, for his pa- tience, insight, encouragement, constructive criticism, and perspective on computer science, working as a scientist, and everything. After my Bache- lor’s and Master’s degrees at Georgia Tech, I decided to continue there for a Ph.D. because of an awesome professor I had recently started working with, Pete Manolios. I was able to transition to Ph.D. work with the confidence that I had an advisor who would help me find the best ways to apply my strengths and who would work with me on my weaknesses. Without Pete, I would not have been able to distinguish the things that only I would care about from the things that would become widely read and respected. For such successes, first thanks goes to Pete. Although I transferred to Northeastern University to continue working under Pete, I have many people to thank from my time at Georgia Tech. Per- haps at the top of the list is the great teacher and wise computer scientist, Prof. Olin Shivers, because I took three great classes from him while at Geor- gia Tech and he moved to Northeastern University a little before Pete and I did.
    [Show full text]
  • Communications of the Acm
    COMMUNICATIONS CACM.ACM.ORG OF THEACM 11/2017 VOL.60 NO.11 Reconfigurable Cambits Association for Computing Machinery Previous A.M. Turing Award Recipients 1966 A.J. Perlis 1967 Maurice Wilkes 1968 R.W. Hamming 1969 Marvin Minsky 1970 J.H. Wilkinson 1971 John McCarthy 1972 E.W. Dijkstra 1973 Charles Bachman 1974 Donald Knuth 1975 Allen Newell 1975 Herbert Simon 1976 Michael Rabin 1976 Dana Scott 1977 John Backus 1978 Robert Floyd 1979 Kenneth Iverson 1980 C.A.R Hoare ACM A.M. TURING AWARD 1981 Edgar Codd 1982 Stephen Cook 1983 Ken Thompson NOMINATIONS SOLICITED 1983 Dennis Ritchie 1984 Niklaus Wirth Nominations are invited for the 2017 ACM A.M. Turing Award. 1985 Richard Karp 1986 John Hopcroft This is ACM’s oldest and most prestigious award and is given 1986 Robert Tarjan to recognize contributions of a technical nature which are of 1987 John Cocke 1988 Ivan Sutherland lasting and major technical importance to the computing field. 1989 William Kahan The award is accompanied by a prize of $1,000,000. 1990 Fernando Corbató 1991 Robin Milner Financial support for the award is provided by Google Inc. 1992 Butler Lampson 1993 Juris Hartmanis Nomination information and the online submission form 1993 Richard Stearns 1994 Edward Feigenbaum are available on: 1994 Raj Reddy http://amturing.acm.org/call_for_nominations.cfm 1995 Manuel Blum 1996 Amir Pnueli 1997 Douglas Engelbart Additional information on the Turing Laureates 1998 James Gray is available on: 1999 Frederick Brooks http://amturing.acm.org/byyear.cfm 2000 Andrew Yao 2001 Ole-Johan Dahl 2001 Kristen Nygaard The deadline for nominations/endorsements is 2002 Leonard Adleman January 15, 2018.
    [Show full text]
  • Contact: Jim Ormond 212-626-0505 [email protected]
    Contact: Jim Ormond 212-626-0505 [email protected] CRYPTOGRAPHY PIONEERS RECEIVE ACM A.M. TURING AWARD Diffie and Hellman’s Invention of Public-Key Cryptography and Digital Signatures Revolutionized Computer Security and Made Internet Commerce Possible NEW YORK, March 1, 2016 – ACM, the Association for Computing Machinery, (www.acm.org) today named Whitfield Diffie, former Chief Security Officer of Sun Microsystems and Martin E. Hellman, Professor Emeritus of Electrical Engineering at Stanford University, recipients of the 2015 ACM A.M. Turing Award for critical contributions to modern cryptography. The ability for two parties to use encryption to communicate privately over an otherwise insecure channel is fundamental for billions of people around the world. On a daily basis, individuals establish secure online connections with banks, e- commerce sites, email servers and the cloud. Diffie and Hellman’s groundbreaking 1976 paper, “New Directions in Cryptography,” introduced the ideas of public-key cryptography and digital signatures, which are the foundation for most regularly-used security protocols on the Internet today. The Diffie- Hellman Protocol protects daily Internet communications and trillions of dollars in financial transactions. The ACM Turing Award, often referred to as the “Nobel Prize of Computing,” carries a $1 million prize with financial support provided by Google, Inc. It is named for Alan M. Turing, the British mathematician who articulated the mathematical foundation and limits of computing and who was a key contributor to the Allied cryptoanalysis of the German Enigma cipher during World War II. “Today, the subject of encryption dominates the media, is viewed as a matter of national security, impacts government-private sector relations, and attracts billions of dollars in research and development,” said ACM President Alexander L.
    [Show full text]
  • A Bibliography of Publications in ACM SIGACT News
    A Bibliography of Publications in ACM SIGACT News Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 11 March 2021 Version 1.28 Title word cross-reference #1 [Mat14a]. #53 [Hes03]. #P [HV95]. f0; 1g [Vio09]. $139.95 [Cha09]. 2 [Hem06a, SS06]. $28.00 [Jou94]. 3 [Sto73a, Sto73b]. $33.95 [Gas05a]. $37.50 [Sta93]. $39.50 [Gas94, O'R92a]. $39.95 [Mak93, Pan93]. 3x + 1 [Sch97]. $46.25 [Vla94]. $49.50 [Hen93]. $49.95 [Pur93, Rie93, Sis93, Zwa93]. 4 × 4 [Shy78a]. $51.48 [Pap05b]. $54.95 [Oli04b]. $60.00 [Ada11]. $69.00 [Mik93]. $72.00 [Oli04c]. $79.95 [Bea07]. 1 [Lit92]. A = B [Kre00, PWZ96]. e [Bla06, Mao94]. i [GKP96]. i; n [GKP96]. k [GG86]. λ [Di 95, Lea97]. N [Nis78, GKP96]. n2 [BBG94]. O(ln n) [Qia87]. O(log log n) [AM75]. O(nlog2 7 log n) [Boo77]. p [Gal74,p LP92]. P = NP [Lip10]. π [Bla97, Hem03a, Mil99, Puc00, SW01]. Σ∗ [Swe87]. −1 [Nah98]. -Aha [Gas09h]. -Calculus [Di 95, Hem03a, Lea97, Mil99, SW01, Puc00]. -colorability [Sto73a, Sto73b]. -complete [Gal74]. -hard [BBG94]. 1 2 -shovelers [LP92]. -stage [Hem06a, SS06]. //cstheory.stackexchange.com [CEG+10]. /Heidelberg [Gri10]. 0 [Kri08, Law06, Lou05, Mos05, Oli06, Pap10, Pri10, Vio04, Wan05, dW07]. 0-201-54886-0 [Vla94]. 0-262-07143-6 [Sta93]. 0-262-08306-X [Wil04].
    [Show full text]
  • Conference Info & Program
    FOCS'89 Conference Information Location The conference will be held at the Sheraton Imperial Hotel, which is located in the Research Triangle Park (RTP) near the Raleigh-Durham International Airport on I-40 at Exit 282 (Page Road exit). (Telephone, inside North Carolina: (800) 222-6503; oth- erwise: (800) 325-3535). All technical sessions and lunches will be held in the meeting rooms of the Sheraton. The cost for reception, lunches, business meeting, and the banquet is included in the reg- ular registration fee. Student registration fees do not include the banquet. Please note that the registration fee increases sharply as of October 1, 1989, so we encourage early registration. Accommodations A block of 250 rooms has been reserved (until October 2nd) at the Sheraton Imperial Hotel. Please make reser- vations directly with the Sheraton using the enclosed form. The October occupancy rate is high, so please register early. Make sure your reservation reaches the Sheraton by 5:00 p.m. on October 2nd to guarantee your accomodation. The prices for rooms are $83 for a single and $88 for a double or triple. In order to receive the special negotiated rate for the conference, please identify yourself with the FOCS'89 Conference. An additional block of rooms has been reserved at the Holiday Inn Raleigh-Durham Airport, located on the west side of Page Road, opposite the Sheraton (approximately a 10 minute walk, 1/2 mile to the Sheraton). The prices of rooms are $75 for a single, $80 for a double and $85 for a triple. Reservations received after October 14th will be provided on a space available basis.
    [Show full text]