نتایج جستجو برای: رمزنگار aes

تعداد نتایج: 8783  

Journal: :Revista da Associacao Medica Brasileira 2013
Walter Mendes Ana Luiza B Pavão Monica Martins Maria de Lourdes de Oliveira Moura Claudia Travassos

OBJECTIVE To analyze the features of preventable adverse events (AEs) in hospitals inpatient in the State of Rio de Janeiro, in Brazil, in order to identify elements that serve as a substrate for priority actions aimed at improving patient safety. METHODS Analysis of data from a baseline retrospective cohort study to assess the incidence of AEs in a sample of records in three teaching hospita...

2012
Duncan Williams Tim Brookes

A system for morphing the softness and brightness of two sounds independently from their other perceptual or acoustic attributes was coded. The system is an extension of a previous one that morphed brightness only, that was based on the Spectral Modelling Synthesis additive/residual model. A Multidimensional Scaling analysis, of listener responses to paired comparisons of stimuli generated by t...

2011
P. Annibale F. Antonacci P. Bestagini A. Brutti A. Canclini L. Cristoforetti E. A. P. Habets J. Filos W. Kellermann K. Kowalczyk A. Lombard E. Mabande D. Markovic P. A. Naylor M. Omologo R. Rabenstein A. Sarti P. Svaizer M. R. P. Thomas

SCENIC is an EC-funded project aimed at developing a harmonized corpus of methodologies for environmentaware acoustic sensing and rendering. The project focusses on space-time acoustic processing solutions that do not just accommodate the environment in the modeling process but that make the environment help towards achieving the goal at hand. The solutions developed within this project cover a...

2017
Mehak Khurana Meena Kumari

---------------------------------------------------------------------***--------------------------------------------------------------------Abstract The emerging need of the secure ciphers has lead to the designing and analysis of many lightweight block ciphers. In this respect, many lightweight block ciphers have been designed, of which is simple AES, one of the popular proposed secure block c...

Journal: :Computers & Electrical Engineering 2010
Ignacio Algredo-Badillo Claudia Feregrino Uribe René Cumplido Miguel Morales-Sandoval

Applications of wireless communications networks are emerging continuously. To offer a good level of security in these applications, new standards for wireless communications propose solutions based on cryptographic algorithms working on special modes of operation. This work presents a custom hardware architecture for the AES-CCM Protocol (AES-CCMP) which is the basis for the security architect...

Journal: :Postgraduate medical journal 1985
A Ingber J Alcalay E J Feuerman

Autoerythrocyte sensitization (AES) is a rare syndrome particularly among males. A young male with typical AES is herewith described. We review all seven published cases of AES in men for which details are available and compare the age of onset, somatic manifestations, associated diseases and psychiatric disturbances between the sexes. We emphasize that the criteria essential for a diagnosis of...

2009
M. Badra

This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) controlling t...

Journal: :IACR Cryptology ePrint Archive 2010
Joppe W. Bos Onur Özen Martijn Stam

In this work, we provide a software benchmark for a large range of 256-bit blockcipher-based hash functions. We instantiate the underlying blockcipher with AES, which allows us to exploit the recent AES instruction set (AESNI). Since AES itself only outputs 128 bits, we consider double-block-length constructions, as well as (single-block-length) constructions based on RIJNDAEL256. Although we p...

Journal: :IACR Cryptology ePrint Archive 2010
Christophe Giraud Adrian Thillard

At CHES 2003, Piret and Quisquater published a very efficient DFA on AES which has served as a basis for many variants published afterwards. In this paper, we revisit P&Q’s DFA on AES and we explain how this attack can be much more efficient than originally claimed. In particular, we show that only 2 (resp. 3) faulty ciphertexts allow an attacker to efficiently recover the key in the case of AE...

Journal: :international journal of environmental research 2014
h. sereshti n. eskandarpour s. samadi gh. aliakbarzadeh

the task specific ionic liquid (tsil), tricaprylmethylammonium thiosalicylate ([a336][ts]),was synthesized, characterized and subsequently used as extraction solvent in dispersive liquid-liquidmicroextraction (dllme) technique. the tsil-dllme method followed by inductively coupled plasmaatomicemission spectrometry (icp-aes) was applied to determination of trace mercury (hg) and cadmium(cd) in a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید