نتایج جستجو برای: رمزنگار aes

تعداد نتایج: 8783  

2017
Manoj V. Murhekar

To the Editor: I read with interest the article by Khan et al. (1). The National Vector-borne Disease Control Program reported >60,000 cases of acute encephalitis syndrome (AES) in India during 2010–2016; 8 states (Assam, Uttar Pradesh, West Bengal, Odisha, Tamil Nadu, Karnataka, Manipur, and Tripura) accounted for most cases (2). In many states, outbreaks of AES occur during the rainy season a...

2015
Christopher J. Harmer Matthew Wynn Rachel Pinto Stuart Cordwell Barbara R. Rose Colin Harbour James A. Triccas Jim Manos Min Wu

Some Pseudomonas aeruginosa strains including Australian Epidemic Strain-1 (AES-1 or AUS-01) cause persistent chronic infection in cystic fibrosis (CF) patients, with greater morbidity and mortality. Factors conferring persistence are largely unknown. Previously we analysed the transcriptomes of AES-1 grown in Luria broth, nematode growth medium for Caenorhabditis elegans assay (both aerobic) a...

2017
Dian Pratamastuti Prastiya Indra Gunawan Darto Saharso

PURPOSE This study aimed to investigate whether serum neuron-specific enolase (NSE) was expressed in acute encephalitis syndrome (AES) that causes neuronal damage in children. METHODS This prospective observational study was conducted in the pediatric neurology ward of Soetomo Hospital. Cases of AES with ages ranging from 1 month to 12 years were included. Cases that were categorized as simpl...

2010
T Panis D Testa A Fasoli A Klein H Carfantan

The stability of Alfvén eigenmodes (AEs) is studied experimentally in the JET tokamak by observing the plasma response to antenna-driven frequency-sweeping perturbations at the plasma edge. During the 2008/9 experimental campaigns, the complete set of the new antennas was operated and AEs with toroidal mode numbers (n) in the intermediate-n range were excited under various plasma conditions. In...

2008
Michael Gorski Stefan Lucks

In this paper we present two new attacks on round reduced versions of the AES. We present the first application of the related-key boomerang attack on 7 and 9 rounds of AES-192. The 7-round attack requires only 2 chosen plaintexts and ciphertexts and needs 2 encryptions. We extend our attack to nine rounds of AES-192. This leaves to a data complexity of 2 chosen plaintexts and ciphertexts using...

2011
Jung Ho Yoo

This paper presents a novel software implementation of AES-CCM (Advanced Encryption Standard-Counter mode with Cipher Block Chaining Message Authentication Code) for multiprocessors. The software includes AES key expansion for dual multiprocessors and cipher/inverse cipher for dual/quad multiprocessors. On the measurement of a Xilinx MicroBlaze multiprocessor based platform, the speedup of our ...

2009
Yun-Sik Park Ji-Hyun Song Jae-Hun Choi Joon-Hyuk Chang

In this paper, we propose a novel acoustic echo suppression (AES) technique based on soft decision in a frequency domain. The proposed approach provides an ef cient and uni ed framework for such procedures as AES gain computation, AES gain modi cation using soft decision, and estimation of relevant parameters based on the same statistical model assumption of the near-end and far-end signal inst...

2004
Liang Xian

The Advanced Encryption Standard (AES), also known as Rijndael is a block cipher. The National Institute of Standards and Technology (NIST) has defined five modes of operation for AES. Each of these modes has different characteristics. The five modes are: Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher FeedBack (CFB), Output FeedBack (OFB), and Counter (CTR). Only AES Counter mo...

2004
HARRIS NOVER

In this paper, we examine algebraic attacks on the Advanced Encryption Standard (AES, also known as Rijndael). We begin with a brief review of the history of AES, followed by a description of the AES algorithm. We then discuss the problem of solving systems of multivariate quadratic equations over arbitrary fields (the MQ problem), as well as some recent general methods for solving it, namely r...

Journal: :IACR Cryptology ePrint Archive 2010
Vincent Rijmen

Related-key attacks on AES-192 and AES-256 have been presented at Crypto 2009 and Asiacrypt 2009. Although these results are already quite spectacular, they have been extended to practical-complexity attacks on AES variants with 10 rounds at Eurocrypt 2010. These advances in cryptanalysis are enabled by the introduction of a new type of related keys. Let the secret key be denoted by k, the roun...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید