منابع مشابه
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features may be achieved by multiple encrypting a message, such as the key-insulated cryptosystems and anonymous channels. Intuitively, a multiple encryption should remain “secure”, whenever there is one component cipher unbreak...
متن کاملImmunopharmacological activity of saponin from Terminalia arjuna and Prosopis spicigera
The aim of the present work was to examine the immunopharmacological (anti-microbial and anti-inflammatory) effect of saponin on human peripheral blood mononuclear cells (PBMC) that are isolated as well as purified from infected (virally) and non-infected (normal) human whole blood samples. However, there is little information available concerning the effect of crude saponin on human PBMC in ca...
متن کاملAn Efficient Earth System Simulation Framework Based on Cca
Muti-physics coupling technologies could achieve a more real simulation for Earth system. The complexity of such simulation is a difficult problem. This paper presents an efficient Earth system simulation framework based on CCA (Common Component Architecture) which is applied in large scale scientific computing put forward recently by America. Based on such component schema, this framework coul...
متن کاملRetrieving Keyword’s to an Image Query using Kernel CCA
In this paper we propose an approach to automatically annotate query images with keywords. We use kernel Canonical Correlation Analysis to learn a semantic representation between images and their associated documents. The semantic space provides a common representation and enables a comparison between the documents and images. This representation is then used in the creation of new document, co...
متن کاملLecture 14 - CCA Security
The OAEP encryption scheme was introduced by Bellare and Rogaway at Eurocrypt ’94. It converts any trapdoor permutation scheme into a public-key encryption scheme. OAEP is widely believed to provide resistance against adaptive chosen ciphertext attack. The main justification for this belief is a supposed proof of security in the random oracle model, assuming the underlying trapdoor permutation ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Ensho
سال: 1981
ISSN: 0389-4290,1884-4006
DOI: 10.2492/jsir1981.1.2_281