منابع مشابه
Sajal Kumar Biswas
Human organism needs movement and activity to grow, develop, and maintain health. Advances in modern technology, however, have almost completely eliminated the necessity for physical exertion in daily life. Physical activity is no longer a natural part of our existence. This lack of physical activity has reduced our ability to maintain a healthy body weight and body composition. Recommended bod...
متن کاملRitayan Biswas Performance Evaluation of Coordinated Multipoint Techniques at Millimeter Wave Frequencies
Master’s Degree Program in Electrical Engineering RITAYAN BISWAS: Performance evaluation of coordinated multipoint techniques at millimeter wave frequencies Tampere University of technology Master of Science Thesis, 68 pages, 0 Appendix pages March 2016 Major: Wireless Communications Examiners: Professor Jukka Lempiäinen, Joonas Säe
متن کاملA Review of Existing 4-bit Crypto S-box cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-boxes
4-bit Linear Relations play an important role in Cryptanalysis of 4-bit Bijective Crypto S-boxes. 4-bit finite differences also a major part of cryptanalysis of 4-bit substitution boxes. Count of existence of all 4-bit linear relations, for all of 16 input and 16 output 4-bit bit patterns of 4-bit bijective crypto S-boxes said as S-boxes has been reported in Linear Cryptanalysis of 4-bit S-boxe...
متن کاملNEON Crypto
NEON is a vector instruction set included in a large fraction of new ARM-based tablets and smartphones. This paper shows that NEON supports high-security cryptography at surprisingly high speeds; normally data arrives at lower speeds, giving the CPU time to handle tasks other than cryptography. In particular, this paper explains how to use a single 800MHz Cortex A8 core to compute the existing ...
متن کاملCrypto-integrity
Designing cryptographic mechanisms as well as products and systems that embed cryptographic components is a challenging task. This task will become increasingly hard as software technology and systems evolve and as the new computational environment becomes more distributed, more diverse, and more global. In order to enable the inclusion of cryptographic components in the future infrastructure a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Scientific & Engineering Research
سال: 2019
ISSN: 2229-5518
DOI: 10.14299/ijser.2019.10.01