نتایج جستجو برای: الگوریتم aes
تعداد نتایج: 31104 فیلتر نتایج به سال:
In this paper we present two new attacks on round reduced versions of the AES. We present the first application of the related-key boomerang attack on 7 and 9 rounds of AES-192. The 7-round attack requires only 2 chosen plaintexts and ciphertexts and needs 2 encryptions. We extend our attack to nine rounds of AES-192. This leaves to a data complexity of 2 chosen plaintexts and ciphertexts using...
This paper presents a novel software implementation of AES-CCM (Advanced Encryption Standard-Counter mode with Cipher Block Chaining Message Authentication Code) for multiprocessors. The software includes AES key expansion for dual multiprocessors and cipher/inverse cipher for dual/quad multiprocessors. On the measurement of a Xilinx MicroBlaze multiprocessor based platform, the speedup of our ...
In this paper, we propose a novel acoustic echo suppression (AES) technique based on soft decision in a frequency domain. The proposed approach provides an ef cient and uni ed framework for such procedures as AES gain computation, AES gain modi cation using soft decision, and estimation of relevant parameters based on the same statistical model assumption of the near-end and far-end signal inst...
The Advanced Encryption Standard (AES), also known as Rijndael is a block cipher. The National Institute of Standards and Technology (NIST) has defined five modes of operation for AES. Each of these modes has different characteristics. The five modes are: Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher FeedBack (CFB), Output FeedBack (OFB), and Counter (CTR). Only AES Counter mo...
In this paper, we examine algebraic attacks on the Advanced Encryption Standard (AES, also known as Rijndael). We begin with a brief review of the history of AES, followed by a description of the AES algorithm. We then discuss the problem of solving systems of multivariate quadratic equations over arbitrary fields (the MQ problem), as well as some recent general methods for solving it, namely r...
Related-key attacks on AES-192 and AES-256 have been presented at Crypto 2009 and Asiacrypt 2009. Although these results are already quite spectacular, they have been extended to practical-complexity attacks on AES variants with 10 rounds at Eurocrypt 2010. These advances in cryptanalysis are enabled by the introduction of a new type of related keys. Let the secret key be denoted by k, the roun...
Anti-TNF drugs are frequently associated with serious Adverse Events (AEs), which necessitates an improved understanding of individual factors that determine efficacy and safety of anti-TNF agents. We mined the US FDA's Adverse Event Reporting System (AERS) for anti-TNF-associated AEs to identify and stratify patient subgroups and drug combinations that exhibit specifically correlated complicat...
Advanced Encryption Standard (AES) is one of the most widely used block ciphers nowadays, and has been established as an encryption standard in 2001. Here we design AES-128 sample-AES (S-AES) quantum circuits for deciphering. In circuit AES-128, perform affine transformation SubBytes part to solve problem that initial state output qubits not ∣0⟩⊗8 state. After that, are able encode new round su...
The Advanced Encryption Standard (AES) was widely accepted as the de facto standard in many securityrelated fields such as Embedded Development, Information Management, and Network Communication etc. In this paper, we firstly study the theory of AES algorithm and then conduct performance analysis of AES algorithm on MPC processor whose frequency is 800MHz according to the superscalar pipeline o...
Virtually all effect units that process digital audio—software plug-ins as well as dedicated hardware—can be controlled digitally. This allows subjecting their settings to optimization processes. We demonstrate the automatic adaptation of reverberation plug-ins to given room impulse responses. This facilitates replacing computationally expensive convolution reverberation units with standard one...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید