Research Intuitions of Asymmetric Crypto System
نویسندگان
چکیده
منابع مشابه
Researchers’ Intuitions About Power in Psychological Research
Many psychology studies are statistically underpowered. In part, this may be because many researchers rely on intuition, rules of thumb, and prior practice (along with practical considerations) to determine the number of subjects to test. In Study 1, we surveyed 291 published research psychologists and found large discrepancies between their reports of their preferred amount of power and the ac...
متن کاملPhilosophical Intuitions
What exactly is a philosophical intuition? And what makes such an intuition reliable, when it is reliable? is paper provides a terminological framework that is able answer to the rst question, and then puts the framework to work developing an answer to the second question. More specically, the paper argues that we can distinguish between two dierent “evidential roles” which intuitions can oc...
متن کاملA Defense of Intuitions
Radical experimentalists argue that we should give up using intuitions as evidence in philosophy. In this paper, I first argue that the studies presented by the radical experimentalists in fact suggest that some intuitions are reliable. I next consider and reject a different way of handling the radical experimentalists’ challenge, what I call the Argument from Robust Intuitions. I then propose ...
متن کاملComplexity Evaluation of Knapsack Crypto System using Fuzzy Set
It is well known that the knapsack cryptosystem is a type of public key cryptosystems. It is based on the well known mathematical concept, i.e., the choosing of one way function. Many Knapsack cryptosystems were invented in the last 20 years, and many attacking methods were invented as a counterattack against the developed knapsack cryptosystems. All the attacking methods aim towards breaking t...
متن کاملNEON Crypto
NEON is a vector instruction set included in a large fraction of new ARM-based tablets and smartphones. This paper shows that NEON supports high-security cryptography at surprisingly high speeds; normally data arrives at lower speeds, giving the CPU time to handle tasks other than cryptography. In particular, this paper explains how to use a single 800MHz Cortex A8 core to compute the existing ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Turkish Journal of Computer and Mathematics Education (TURCOMAT)
سال: 2021
ISSN: 1309-4653
DOI: 10.17762/turcomat.v12i3.2016