نتایج جستجو برای: random key representation

تعداد نتایج: 1030562  

Journal: :International Journal of Computer Applications 2016

Journal: :IACR Cryptology ePrint Archive 2013
Elena Andreeva Andrey Bogdanov Yevgeniy Dodis Bart Mennink John P. Steinberger

The Advanced Encryption Standard (AES) is the most widely used block cipher. The high level structure of AES can be viewed as a (10-round) key-alternating cipher, where a t-round key-alternating cipher KAt consists of a small number t of fixed permutations Pi on n bits, separated by key addition: KAt(K,m) = kt ⊕ Pt(. . . k2 ⊕ P2(k1 ⊕ P1(k0 ⊕m)) . . . ), where (k0, . . . , kt) are obtained from ...

2009
Roy Cerqueti Mauro Costantini Claudio Lupi

This paper provides a theoretical functional representation of the density function related to the DickeyFuller random variable. The approach is extended to cover the multivariate case in two special frameworks: the independence and the perfect correlation of the series. key words: Dickey-Fuller distribution, unit root JEL codes: C12, C16, C22

2010
Anup Kumar K. Anup Kumar

Problem statement: The strength of the block ciphers depend on the degree of confusion and diffusion induced in the cipher. Most of the transformations used for this purpose are well known to every one and can be broken by a crypt analyzer. Therefore, in order to counter attack the crypt analyzer, there is a need for better transformations in addition to the existing one. Approach: We tried to ...

Journal: :مدیریت بازرگانی 0
رضا شافعی استادیار گروه مدیریت، دانشکدۀ علوم انسانی و اجتماعی، دانشگاه کردستان، سنندج، ایران عادل صلواتی استادیار گروه مدیریت، دانشکدۀ علوم انسانی، دانشگاه آزاد اسلامی واحد سنندج، سنندج، ایران رودابه جهانیان کارشناس‎ارشد مدیریت بازرگانی (بازاریابی)، دانشکدۀ علوم انسانی، دانشگاه آزاد اسلامی واحد سنندج، ایران

the purpose of this study was to identify the effects of green brand image on the green brand equity in the customers of appliance dealer's representation and appliance dealers in the chain department stores of sanandaj. research variables selected from yushan chen (2010) study. a questionnaire was used to measure theses dimensions that have been confirmed by experts and had 24 indices. it...

2007
Benoît Libert Jean-Jacques Quisquater Moti Yung

Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently introduced the idea of parallel key-insulated encryption (PKIE) where distinct physically-secure devices (called helpers) are independently used in key updates. Their motivation was to reduce the risk of exposure for helpers by ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید