Understanding RUP Integrity of COLM

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Understanding RUP Integrity of COLM

The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much like its antecedents COPA, ELmE, and ELmD, COLM consists of two parallelizable encryption layers connected by a linear mixing function. While COPA uses plain XOR mixing, ELmE, ELmD, and COLM use a more involved invertible mixing function. In this work, we investigate the integrity of the COLM str...

متن کامل

Colm Mulhern: PhD Thesis (2012)

This thesis will explore the deterministic dynamics of systems of coupled oscillators. In particular, the focus of the thesis will be concerned with the transport properties of these systems. Of interest is how particles work together, cooperatively, to achieve directed transport. For this reason, the strength of the coupling between the particles will serve as the main control parameter. Furth...

متن کامل

Beyond RUP

Object technology is a growing approach for the development of quality software. It provides a sophisticated environment to support good software engineering practice. Use of object technology should not be restricted to languages but should encompass full lifecycle support by use of an object-oriented (OO) development methodology or process. Integrated process-focused OO approaches to software...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR Transactions on Symmetric Cryptology

سال: 2017

ISSN: 2519-173X

DOI: 10.46586/tosc.v2017.i2.143-161