نتایج جستجو برای: caesar competition

تعداد نتایج: 86460  

Journal: :The English Historical Review 1908

Journal: :The Classical Review 1890

2003
Matthew Caesar Randy H. Katz

Root Cause Analysis of BGP Dynamics

رمزنگاری احراز اصالت­شده یک حالت اجرایی در رمزهای قطعه­ای بوده که خدمت­های احراز اصالت، محرمانگی و تمامیت داده را در فرآیند انتقال اطلاعات فراهم می­کند. از سال 2014 مسابقه­ی تحت عنوان مسابقه­ی CAESAR آغاز شده است که هدف از این مسابقه رسیدن به طرح­های رمزنگاری احرازاصالت­شده است که مزایای بیشتری نسبت به طرح AES-GCM ارائه ­دهند و برای استفاده گسترده مناسب باشند. در این مقاله، تمامی نامزدهای معرفی...

Journal: :IACR Trans. Symmetric Cryptol. 2016
Colin Chaigneau Henri Gilbert

AEZ is a parallelizable, AES-based authenticated encryption algorithm that is well suited for software implementations on processors equipped with the AES-NI instruction set. It aims at offering exceptionally strong security properties such as nonce and decryption-misuse resistance and optimal security given the selected ciphertext expansion. AEZ was submitted to the authenticated ciphers compe...

Journal: :IACR Cryptology ePrint Archive 2017
Xiaoyang Dong Zheng Li Xiaoyun Wang Ling Qin

This paper studies the Keccak-based authenticated encryption (AE) scheme Ketje Sr against cube-like attacks. Ketje is one of the remaining 16 candidates of third round CAESAR competition, whose primary recommendation is Ketje Sr. Although the cube-like method has been successfully applied to Ketje’s sister ciphers, including Keccak-MAC and Keyak – another Keccak-based AE scheme, similar attacks...

1992
Benjamin Ka-Yin T'sou Hing-cheung Ho Tom B. Y. Lai Caesar Suen Lun Hing-lung Lin

Benjamin K Tsou Hing-cheung Ho Tom Bong-yeung Lai Caesar Suen Lun Hing-lung Lin City Polytechnic of Hong Kong

Journal: :Joined journal 2022

Penerapan kriptografi pada asset budaya sangat perlu dilakukan, karena banyaknya klaim Indonesia oleh negara asing. Oleh itu penelitian ini menggunakan tembang macapat Sinom, Pangkur, Pocung, Kinanti. Pada membandingkan algoritma Caesar Cipher dan Rail Fence untuk mengetahui proses penyandian efektifitas waktu enkripsi deskripsi. Waktu menunjukkan deskripsi lebih lama dibandingkan enkripsi. rat...

Journal: :Applied ergonomics 2006
Kathleen M Robinette Hein A M Daanen

Three-dimensional (3D) body scanners are increasingly used to derive 1D body dimensions from 3D whole body scans for instance, as input for clothing grading systems to make made-to-measure clothing or for width and depth dimensions of a seated workstation. In this study, the precision of the scanner-derived 1D dimensions from the CAESAR survey, a multinational anthropometric survey, was investi...

2010
Ida Glaser

~us writes Sayyid Qutb, the founding father • ~f the Islamic Brotherhood in Egypt, in a polemic essay! which levels at Christians the common Islamic accusation that they suffer from a 'hideous schizophrenia' encapsulated in the exhortation to 'render to Caesar the things that are Caesar's and to God the things that are God's.' Since its inception, Islam has presented unprecedented challenges to...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید