نتایج جستجو برای: cbc findings

تعداد نتایج: 770813  

Journal: :Structure 2012
Eva M Huber Daniel H Scharf Peter Hortschansky Michael Groll Axel A Brakhage

The CCAAT box is a frequent element of eukaryotic promoters, and its specific recognition by the conserved heterotrimeric CCAAT-binding complex (CBC) constitutes a key step in promoter organization and regulation of transcription. Here, we report the crystal structures of the CBC from Aspergillus nidulans in the absence and in complex with double-stranded DNA at 1.8 Å resolution. The histone-li...

2005
Mihir Bellare Krzysztof Pietrzak Phillip Rogaway

We present an improved bound on the advantage of any q-query adversary at distinguishing between the CBC MAC over a random n-bit permutation and a random function outputting n bits. The result assumes that no message queried is a prefix of any other, as is the case when all messages to be MACed have the same length. We go on to give an improved analysis of the encrypted CBC MAC, where there is ...

Journal: :Reviews on Advanced Materials Science 2023

Abstract Graphene oxide (GO) is a two-dimensional derivative of graphene material, with carboxy, hydroxy group functional groups at the middle sheets, and oxygen-containing sheet edges. It has multiple advantages, such as high strength, hydrophilicity, strong reactivity. With development construction materials, GO been widely used nano-reinforced material in cement-based composites (CBCs). Base...

2016
Mayuresh Vivekanand Anand Ehsan Ebrahimi Targhi Gelo Noel Tabia Dominique Unruh

We examine the IND-qCPA security of the wide-spread block cipher modes of operation CBC, CFB, OFB, CTR, and XTS (i.e., security against quantum adversaries doing queries in superposition). We show that OFB and CTR are secure assuming that the underlying block cipher is a standard secure PRF (a pseudorandom function secure under classical queries). We give counterexamples that show that CBC, CFB...

Journal: :Marketing Science 2012
Olivier Toubia Martijn G. de Jong Daniel Stieger Johann Füller

W develop and test an incentive-compatible Conjoint Poker (CP) game. The preference data collected in the context of this game are comparable to incentive-compatible choice-based conjoint (CBC) analysis data. We develop a statistical efficiency measure and an algorithm to construct efficient CP designs. We compare incentive-compatible CP to incentive-compatible CBC in a series of three experime...

Journal: :Cell stem cell 2012
Nick Barker Alexander van Oudenaarden Hans Clevers

Decades ago, two nonoverlapping crypt stem cell populations were proposed: Leblond's Crypt Base Columnar (CBC) cell and Potten's +4 cell. The identification of CBC markers including Lgr5 has confirmed Leblond's predictions that CBC cells are anatomically distinct, long-lived stem cells that permanently cycle. While Potten originally described +4 cells as proliferative and unusually radiation-se...

2005
Chris J. Mitchell

This paper is primarily concerned with the CBC block cipher mode. The impact on the usability of this mode of recently proposed padding oracle attacks, together with other related attacks described in this paper, is considered. For applications where unauthenticated encryption is required, the use of CBC mode is compared with its major symmetric rival, namely the stream cipher. It is argued tha...

Journal: :CoRR 2017
Abdessalem Abidi Christophe Guyeux Jacques Demerjian Belagacem Bouallegue Mohsen Machhout

The Cipher Block Chaining (CBC) mode of encryption was invented in 1976, and it is currently one of the most commonly used mode. In our previous research works, we have proven that the CBC mode of operation exhibits, under some conditions, a chaotic behavior. The dynamics of this mode has been deeply investigated later, both qualitatively and quantitatively, using the rigorous mathematical topo...

2010
Charles Rackoff Serge Gorbunov

In [4], Bernstein presented a simple proof of security of Cipher Block Chaining (CBC) Message Authentication Code (MAC) against adversaries querying messages all of which are of the same length. In this paper we show that Bernstein’s proof can be used to prove security of CBC MAC against adversaries querying non-empty messages that are not prefixes of each other. This implies that “length-prepe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید