Reaping the Whirlwind

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Sowing the Wind and Reaping the Whirlwind? The Effect of Wind Turbines on Residential Well-Being

We investigate the effect of the physical presence of wind turbines on residential wellbeing in Germany, using panel data from the German Socio-Economic Panel (SOEP) and a unique novel panel data set on more than 20,000 wind turbines for the time period between 2000 and 2012. Using a Geographical Information System (GIS), we calculate the proximity between households and the nearest wind turbin...

متن کامل

MERS-CoV: An Epidemic Whirlwind

Corona virus as a Middle East Respiratory Syndrome (MERS) considered being a new complicated disease; it infects the epithelial cells in the respiratory and/or intestinal tracts, thus causing disease in epidemic proportions. The situation is exacerbated by either a short incubation period between 2-7 days or between 12-14 days. In September 2012, coronavirus was identified for the first time in...

متن کامل

Second Preimage Analysis of Whirlwind

Whirlwind is a keyless AES-like hash function that adopts the Sponge model. According to its designers, the function is designed to resist most of the recent cryptanalytic attacks. In this paper, we evaluate the second preimage resistance of theWhirlwind hash function. More precisely, we apply a meet in the middle preimage attack on the compression function which allows us to obtain a 5-round p...

متن کامل

Around splitting and reaping

We prove several results on some cardinal invariants of the continuum which are closely related to either the splitting number s or its dual, the reaping number r.

متن کامل

Cryptanalysis of Reduced-Round Whirlwind (Full Version)

The Whirlwind hash function, which outputs a 512-bit digest, was designed by Barreto et al. and published by Design, Codes and Cryptography in 2010. In this paper, we provide a thorough cryptanalysis on Whirlwind. Firstly, we focus on security properties at the hash function level by presenting (second) preimage, collision and distinguishing attacks on reduced-round Whirlwind. In order to launc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Index on Censorship

سال: 2004

ISSN: 0306-4220,1746-6067

DOI: 10.1177/030642200403300124