LEADER 03827nam 22006015 450 001 996418165803316 005 20200630030811.0 010 $a981-15-3722-4 024 7 $a10.1007/978-981-15-3722-6 035 $a(CKB)4100000010673728 035 $a(DE-He213)978-981-15-3722-6 035 $a(MiAaPQ)EBC6141331 035 $a(PPN)243223870 035 $a(EXLCZ)994100000010673728 100 $a20200317d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDevelopment of a Numerical Simulation Method for Rocky Body Impacts and Theoretical Analysis of Asteroidal Shapes$b[electronic resource] /$fby Keisuke Sugiura 205 $a1st ed. 2020. 210 1$aSingapore :$cSpringer Singapore :$cImprint: Springer,$d2020. 215 $a1 online resource (XIII, 134 p. 57 illus., 55 illus. in color.) 225 1 $aSpringer Theses, Recognizing Outstanding Ph.D. Research,$x2190-5053 311 $a981-15-3721-6 320 $aIncludes bibliographical references. 327 $aIntroduction -- Method -- Results: Shapes of Impact Outcomes -- Discussion: Collisional History of Asteroids -- Application: Extremely Elongated Shape of 1I/?Oumuamua -- Summary and Future Prospects -- Summary and Future Prospects -- Acknowledgement. . 330 $aThis book describes numerical simulations of collisions between asteroids, based on a unique numerical code developed by the author. The code accurately solves the elastic dynamic equations and describes the effects of fracture and friction, which makes it possible to investigate the shapes of impact outcomes produced by asteroid collisions and subsequent gravitational accumulation of fragments. The author parallelizes the code with high parallelization efficiency; accordingly, it can be used to conduct high-resolution simulations with the aid of supercomputers and clarify the shapes of small remnants produced through the catastrophic destruction of asteroids. The author demonstrates that flat asteroids can only be produced by impacts involving objects with similar mass and low velocity, which suggests that the flat asteroids in our solar system were created in the planet formation era and have kept their shapes until today. The author also shows that asteroid collisions under certain conditions can produce the extremely elongated shape of an interstellar minor body, 1I/?Oumuamua. In brief, the book offers a comprehensive investigation of asteroid impacts and shapes, making it a uniquely valuable resource. 410 0$aSpringer Theses, Recognizing Outstanding Ph.D. Research,$x2190-5053 606 $aPlanetary science 606 $aAstrophysics 606 $aMathematical physics 606 $aPhysics 606 $aPlanetary Sciences$3https://scigraph.springernature.com/ontologies/product-market-codes/P22060 606 $aTheoretical Astrophysics$3https://scigraph.springernature.com/ontologies/product-market-codes/P22080 606 $aNumerical and Computational Physics, Simulation$3https://scigraph.springernature.com/ontologies/product-market-codes/P19021 615 0$aPlanetary science. 615 0$aAstrophysics. 615 0$aMathematical physics. 615 0$aPhysics. 615 14$aPlanetary Sciences. 615 24$aTheoretical Astrophysics. 615 24$aNumerical and Computational Physics, Simulation. 676 $a523.44 700 $aSugiura$b Keisuke$4aut$4http://id.loc.gov/vocabulary/relators/aut$0888463 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996418165803316 996 $aDevelopment of a Numerical Simulation Method for Rocky Body Impacts and Theoretical Analysis of Asteroidal Shapes$91984742 997 $aUNISA LEADER 05147nam 22009135 450 001 9910484014203321 005 20251226200311.0 010 $a3-540-74462-2 024 7 $a10.1007/978-3-540-74462-7 035 $a(CKB)1000000000490955 035 $a(SSID)ssj0000319955 035 $a(PQKBManifestationID)11247512 035 $a(PQKBTitleCode)TC0000319955 035 $a(PQKBWorkID)10338700 035 $a(PQKB)11152667 035 $a(DE-He213)978-3-540-74462-7 035 $a(MiAaPQ)EBC3063221 035 $a(MiAaPQ)EBC337163 035 $a(Au-PeEL)EBL337163 035 $a(OCoLC)808680597 035 $a(MiAaPQ)EBC6806143 035 $a(Au-PeEL)EBL6806143 035 $a(OCoLC)184938739 035 $a(PPN)123164524 035 $a(EXLCZ)991000000000490955 100 $a20100301d2007 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSelected Areas in Cryptography $e13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected Papers /$fedited by Eli Biham, Amr M. Youssef 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (XI, 395 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4356 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-74461-4 320 $aIncludes bibliographical references and index. 327 $aBlock Cipher Cryptanalysis -- Improved DST Cryptanalysis of IDEA -- Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192 -- Related-Key Rectangle Attack on the Full SHACAL-1 -- Stream Cipher Cryptanalysis I -- Cryptanalysis of Achterbahn-Version 2 -- Cryptanalysis of the Stream Cipher ABC v2 -- The Design of a Stream Cipher LEX -- Dial C for Cipher -- Improved Security Analysis of XEX and LRW Modes -- Extended Hidden Number Problem and Its Cryptanalytic Applications -- Changing the Odds Against Masked Logic -- Advances on Access-Driven Cache Attacks on AES -- Blind Differential Cryptanalysis for Enhanced Power Attacks -- Efficient Implementations I -- Efficient Implementations of Multivariate Quadratic Systems -- Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication -- Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems -- Stream Cipher Cryptanalysis II -- On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2 -- Multi-pass Fast Correlation Attack on Stream Ciphers -- Crossword Puzzle Attack on NLS -- Invited Talk -- When Stream Cipher Analysis Meets Public-Key Cryptography -- Efficient Implementations II -- On Redundant ?-Adic Expansions and Non-adjacent Digit Sets -- Pairing Calculation on Supersingular Genus 2 Curves -- Efficient Divisor Class Halving on Genus Two Curves -- Message Authentication on 64-Bit Architectures -- Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme -- Constructing an Ideal Hash Function from Weak Ideal Compression Functions -- Provably Good Codes for Hash Function Design. 330 $aThis book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Selected Areas in Cryptography, SAC 2006, held in Montreal, Canada in August 2006. The 25 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections on block cipher cryptanalysis, stream cipher cryptanalysis, block and stream ciphers, side-channel attacks, efficient implementations, message authentication codes, and hash functions. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4356 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aElectronic data processing$xManagement 606 $aAlgorithms 606 $aComputer networks 606 $aApplication software 606 $aCryptology 606 $aData and Information Security 606 $aIT Operations 606 $aAlgorithms 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aElectronic data processing$xManagement. 615 0$aAlgorithms. 615 0$aComputer networks. 615 0$aApplication software. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aIT Operations. 615 24$aAlgorithms. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 676 $a001.5436 702 $aBiham$b Eli 702 $aYoussef$b Amr M. 712 12$aSAC 2006 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484014203321 996 $aSelected Areas in Cryptography$92814504 997 $aUNINA