منابع مشابه
Understanding RUP Integrity of COLM
The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much like its antecedents COPA, ELmE, and ELmD, COLM consists of two parallelizable encryption layers connected by a linear mixing function. While COPA uses plain XOR mixing, ELmE, ELmD, and COLM use a more involved invertible mixing function. In this work, we investigate the integrity of the COLM str...
متن کاملColm Mulhern: PhD Thesis (2012)
This thesis will explore the deterministic dynamics of systems of coupled oscillators. In particular, the focus of the thesis will be concerned with the transport properties of these systems. Of interest is how particles work together, cooperatively, to achieve directed transport. For this reason, the strength of the coupling between the particles will serve as the main control parameter. Furth...
متن کاملBeyond RUP
Object technology is a growing approach for the development of quality software. It provides a sophisticated environment to support good software engineering practice. Use of object technology should not be restricted to languages but should encompass full lifecycle support by use of an object-oriented (OO) development methodology or process. Integrated process-focused OO approaches to software...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR Transactions on Symmetric Cryptology
سال: 2017
ISSN: 2519-173X
DOI: 10.46586/tosc.v2017.i2.143-161