>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 106-120 共查到differential相关记录1141条 . 查询时间(0.182 秒)
At CRYPTO'16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with SIMON. SKINNY can be implemented efficiently in both soft- and hardware, possess...
In this paper, a new method has been presented for the extraction of edge information by using Differential Search Optimization Algorithm. The proposed method is based on using a new heuristic image t...
The security of SHA-3 against different kinds of attacks are of vital importance for crypto systems with SHA-3 as the security engine. In this paper, we look into the differential fault analysis of SH...
Differential absorption lidar (DIAL) remote sensing is a promising technology for atmospheric CO2 detection. However, stringent wavelength accuracy and stability are required in DIAL system. Accurate ...
Background: Sugar-sweetened beverage (SSB) consumption and low-grade chronic inflammation are both independently associated with type 2 diabetes and cardiovascular disease. Fructose, a major component...
Background: Sugar-sweetened beverage (SSB) consumption and low-grade chronic inflammation are both independently associated with type 2 diabetes and cardiovascular disease. Fructose, a major component...
The algorithm presented in this paper computes a maximum probability differential characteristic in a Substitution-Permutation Network (or SPN). Such characteristics can be used to prove that a cipher...
This work exploits internal differentials within a cipher in the context of Differential Fault Analysis (DFA). This in turn overcomes the nonce barrier which acts as a natural counter-measure against ...
SIMON is a lightweight block cipher designed by NSA in 2013. NSA presented the specification and the implementation efficiency, but they did not provide detailed security analysis nor the design ratio...
Physical illnesses that are difficult to diagnose are sometimes dismissed by physicians as “not real” or “all in the patient’s head”[ Iwata et. al. (2003), Hiro et. al. (2010), Sinha et. al. (2012), S...
Tracking bits through block ciphers and optimizing attacks at hand is one of the tedious task symmetric cryptanalysts have to deal with. It would be nice if a program will automatically handle them at...
Midori is a light weight block cipher recently presented by Banik et al in ASIACRYPT 2015. There are two versions of Midori with state sizes of 64-bit and 128-bit respectively. The round function is b...
Elevations of postprandial triacylglycerol-rich plasma lipoproteins and suppressions of HDL-cholesterol concentrations are considered potentially atherogenic. Long-term studies have shown beneficia...
In this first paper we outline what possible historic-epistemological role might have played the work of Ulisse Dini on implicit function theory in formulating the structure of differentiable manifold...
ASCON is an authenticated encryption algorithm which is recently qualified for the second-round of the Competition for Authenticated Encryption: Security, Applicability, and Robustness. So far, succe...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...