Recovery from Nuclear Attack

ثبت نشده
چکیده

PREFACE This report on Recovery From Nuclear Attack should be of interest to all concerned with civil defense and nuclear attack. As pointed out in the report, the "impossibility" of recovery is often advanced as a reason for doing nothing to develop an effective civil defense program for the United States. However, those who have devoted years to the study of civil defense in general, and postattack problems in particular, do not agree that recovery would be impossible. There is no doubt whatsoever that if a large-scale nuclear exchange should ever occur, the result would be a massive disaster for the societies involved. The death, suffering, misery, and long-term consequences of various types would have few if any parallels in human experience—and certainly none in the history of the United States. But this is not the same as saying that recovery would be "impossible." As the report says, "in years of research, no insuperable barrier to recovery has been found." The genesis of this publication was the perceived need to respond to not infrequent inquiries on nuclear attack recovery issues. The starting point was a 1979 "Research Report on Recovery From Nuclear Attack," published by the Defense Civil Preparedness Agency—a predecessor to the Federal Emergency Management Agency. Based on research and new concerns, the document is a significantly revised and updated effort to deal with the difficult issues of the effects of the use of nuclear weapons against the United States.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

One-Way IND-CNA Key Setup - a Step Towards Provably Secure Symmetric Encryption

We analyse the consequences of the specific properties of the key-setup phase in symmetric encryption schemes for their security. We find that key-setup routines satisfying IND-CNA and one-wayness allow to construct schemes which are provably secure against key-recovery attacks. We propose a specific cryptosystem for which we show that the key-setup routine ensures a significant increase in the...

متن کامل

Collimator-detector response compensation in molecular SPECT reconstruction using STIR framework

Introduction:It is well-recognized that collimator-detector response (CDR) is the main image blurring factor in SPECT.  In this research, we compensated the images for CDR in molecular SPECT by using STIR reconstruction framework. Methods: To assess resolution recovery capability of the STIR, a phantom containing five point sources along with a micro Derenzo p...

متن کامل

Security Analysis of the Distance Bounding Protocol Proposed by Jannati and Falahati

In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. In addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...

متن کامل

A practical state recovery attack on the stream cipher Sablier v1

Sablier is an authenticated encryption cipher submitted to the CAESAR competition, which is composed of the encryption Sablier v1 and the authentication Au. In this work we present a state recovery attack against the encryption Sablier v1 with time complexity about 2 operations and data complexity about 24 of 16-bit keywords. Our attack is practical in the workstation. It is noticed that the up...

متن کامل

Success probability in chi - square attacks

Knudsen and Meier applied the χ-attack to RC6. This attack is one of the most effective attacks for RC6. The χ-attack can be used for both distinguishing attacks and for key recovery attacks. Up to the present, theoretical analysis of χ-attacks, especially the relation between a distinguishing attack and a key recovery attack, has not been discussed. In this paper, we investigate the theoretica...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004