نتایج جستجو برای: caesar
تعداد نتایج: 799 فیلتر نتایج به سال:
We provide the first hardware implementation of AEZ, a third-round candidate to the CAESAR competition for authenticated encryption. Complex, optimized for software, and impossible to implement in a single pass, AEZ poses significant obstacles for any hardware realization. Still, we find that a hardware implementation of AEZ is quite feasible. On Xilinx Virtex-6 FPGAs, our single-core design ha...
We give matrix and supergravity descriptions of type IIA F-strings polarizing into cylindrical D2 branes. When a RR four-form field strength F4 is turned on in a supersymmetric fashion (with 4 supercharges) , a complete analysis of the solutions reveals the existence of a moduli space of F1 → D2 polarizations (Caesar) for some fractional strengths of the perturbation, and of no polarization wha...
In a letter to his friend Burgundio (Sidon. epist. 9.14), who was about write laus Caesaris, Sidonius Apollinaris drew up short list of the works written on Caesar that had face: scripta Patavinis, opera Svetonii, ephemeris Balbi, and finally Iuventii Martialis historia. If mention Livy, Suetonius, Balbus is not surprising, name Iuventius (or Vivencius in Parisinus Latinus 9551) raises some pro...
We investigate six authenticated encryption schemes (ACORN, ASCON-128a, Ketje Jr, ICEPOLE-128a, MORUS, and NORX-32) from the CAESAR competition. We aim at state recovery attacks using a SAT solver as a main tool. Our analysis reveals that these schemes, as submitted to CAESAR, provide strong resistance against SAT-based state recoveries. To shed a light on their security margins, we also analys...
Originally published by the National Center for Study of Collective Bargaining in Higher Education and Professions, Proceedings, Twenty-Seventh Annual Conference, April, 1999, Accountability Education: A Report Card, Caesar J. Naples, Editor
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید