نتایج جستجو برای: استاندارد gost 10791
تعداد نتایج: 35658 فیلتر نتایج به سال:
Distinguishing distributions is a major part during cryptanalysis of symmetric block ciphers. The goal of the cryptanalyst is to distinguish two distributions; one that characterizes the number of certain events which occur totally at random and another one that characterizes same type of events but due to propagation inside the cipher. This can be realized as a hypothesis testing problem, wher...
GreenPhylDB (http://greenphyl.cirad.fr) is a comprehensive platform designed to facilitate comparative functional genomics in Oryza sativa and Arabidopsis thaliana genomes. The main functions of GreenPhylDB are to assign O. sativa and A. thaliana sequences to gene families using a semi-automatic clustering procedure and to create 'orthologous' groups using a phylogenomic approach. To date, Gree...
چکیده ندارد.
According to GOST 19222-84, the dependence of physical-mechanical characteristics sawdust concrete on specific gravity wet coniferous species and ash-slag mixture in composition was studied. A one-factor experiment carried out laboratory Department Reproduction Processing Forest Resources, Federal State Budgetary Educational Institution Higher Education “Bratsk University” order justify share c...
Studying the physical–mechanical properties of soil is one important issues when basing parameters device that softens knot between cotton rows. At same time, it necessary to determine these studying effect on energy and quality indicators. The physical, mechanical technological (soil moisture, density hardness) were studied in 0–15 cm layers at intervals 5 according GOST 20915–2011. It can be ...
چکیده ندارد.
We revisit meet-in-the-middle (MITM) attacks on block ciphers. Despite recent significant improvements of the MITM attack, its application is still restrictive. In other words, most of the recent MITM attacks work only on block ciphers consisting of a bit permutation based key schedule such as KTANTAN, GOST, IDEA, XTEA, LED and Piccolo. In this paper, we extend the MITM attack so that it can be...
In August 2012, the Streebog hash function was selected as the new Russian cryptographic hash standard (GOST R 34.11-2012). In this paper, we investigate the new standard in the context of malicious hashing and present a practical collision for a malicious version of the full hash function. In particular, we apply the rebound attack to find three solutions for three different differential paths...
چکیده ندارد.
چکیده ندارد.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید