Boomerang Sign.
نویسندگان
چکیده
1Former Professor and Head, 2Resident, 3Assistant Professor, 4Resident, Department of Medicine, SMS Medical College, Jaipur Received: 24.06.2013; Revised: 14.02.2014; Accepted: 14.02.2014 (a) (b) Fig. 1: MRI of the brain showing hyperintensities in the splenium of corpus callosum the “bommerang sign” in (a) T2W FLAIR (Fluid Attenuated Inversion Recovery) and (b) DWI (Diffusion Weighted Image) sequences
منابع مشابه
Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256
In this paper we study the security of hash functions SM3 and BLAKE-256 against boomerang attack. SM3 is designed by X. Wang et al. and published by Chinese Commercial Cryptography Administration Office for the use of electronic certification service system in China. BLAKE is one of the five finalists of the NIST SHA-3 competition submitted by J.-P. Aumasson et al. For SM3, we present boomerang...
متن کاملImpossible Boomerang Attack for Block Cipher Structures
Impossible boomerang attack [5] (IBA) is a new variant of differential cryptanalysis against block ciphers. Evident from its name, it combines the ideas of both impossible differential cryptanalysis and boomerang attack. Though such an attack might not be the best attack available, its complexity is still less than that of the exhaustive search. In impossible boomerang attack, impossible boomer...
متن کاملNew Results on Boomerang and Rectangle Attacks
The boomerang attack is a new and very powerful cryptanalytic technique. However, due to the adaptive chosen plaintext and ciphertext nature of the attack, boomerang key recovery attacks that retrieve key material on both sides of the boomerang distinguisher are hard to mount. We also present a method for using a boomerang distinguisher, which enables retrieving subkey bits on both sides of the...
متن کاملThe Return of the Boomerang
The boomerang analysis, together with its offspring the amplified boomerang analysis and the rectangle analysis, are techniques that are widely used in the analysis of block ciphers. We give realistic examples which demonstrate that the boomerang analysis can commonly give probability values that are highly inaccurate. Thus any complexity estimates for the security of a block cipher based on th...
متن کاملThe Boomerang White Paper: A Page as You Like It
Boomerang is a dynamic HTML page recon guration system. A user accesses Boomerang via the Common Gateway Interface. The user supplies a page name and a template, Boomerang fetches the requested page and uses the template to recon gure it. The template is a sequence of string manipulation rules. The rules are written in a simple regular expression-based pattern matching language. Boomerang also ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- The Journal of the Association of Physicians of India
دوره 63 5 شماره
صفحات -
تاریخ انتشار 2015