منابع مشابه
... : Variations around two schemes of T. Matsumoto and H. Imai
In 4], H. Imai and T. Matsumoto presented some new candidate trapdoor one-way permutations with a public key given as multivariate polynomials over a nite eld. One of these schemes was later presented in 7] under the name C , and was based on the idea of hiding a monomial eld equation. This scheme was broken in 8] by Jacques Patarin, due to unexpected algebraic properties.) some schemes to repa...
متن کاملResponse to the Discussion of Belief Functions1
The present discussion is primarily about how to interpret belief functions, and the discussants have a wide variety of views on this topic. I am somewhat disappointed at this, both because I would like to see work on belief functions move on from interpretation to application, and also, of course, because I have been explaining my own views on the interpretation of belief functions for many ye...
متن کاملIhara’s Question/oda–matsumoto Conjecture
In this manuscript we show that function fields K|k with td(K|k) > dim(k)+1 can be recovered from their maximal pro-` abelian-by-central Galois theory, where dim(k) is the Kronecker dimension. This extends the main result of Pop [P5] beyond the case where k is an algebraic closure of a finite field. We also show how this implies the pro-` form of Ihara’s question / Oda-Matsumoto conjecture I/OM...
متن کاملa comparative study of language learning strategies employmed by bilinguals and monolinguals with reference to attitudes and motivation
هدف از این تحقیق بررسی برخی عوامل ادراکی واحساسی یعنی استفاده از شیوه های یادگیری زبان ، انگیزه ها ونگرش نسبت به زبان انگلیسی در رابطه با زمینه زبانی زبان آموزان می باشد. هدف بررسی این نکته بود که آیا اختلافی چشمگیر میان زبان آموزان دو زبانه و تک زبانه در میزان استفاده از شیوه های یادگیری زبان ، انگیزه ها نگرش و سطح مهارت زبانی وجود دارد. همچنین سعی شد تا بهترین و موثرترین عوامل پیش بینی کننده ...
15 صفحه اولAn Attack on Two Hash Functions by Zheng-Matsumoto-Imai
In [ZMI89,ZMI90] two constructions for a collision resistant hash function were proposed. The first scheme is based on a block cipher, and the second scheme uses modular arithmetic. It is shown in this paper that both proposals have serious weaknesses.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wind Engineers, JAWE
سال: 1997
ISSN: 1883-8413,0912-1935
DOI: 10.5359/jawe.1997.41