نتایج جستجو برای: prince

تعداد نتایج: 4607  

Journal: :پژوهش ادبیات معاصر جهان 0

one important aspect of the little prince by antoinede saint-exupery 1900 -1944) is a phenomenological approach on the story thatneeds to be analyzed for a clear understanding of the text. according to manysearches in valid english and persian data bases it seems that this aspect of thelittle prince hasn’t been of interest to domestic and foreign researchers.this descriptive- analytical study d...

Journal: :Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery 2011
Richard M Rosenfeld

ENGLISH TOY SPANIELS (BLENHEIM & PRINCE CHARLES) JUDGE: Mr. Thomas O'Neal ENGLISH TOY SPANIELS (BLENHEIM & PRINCE CHARLES). Sweepstakes, 6 to 9 Months Dogs. 1 41 AMERGLO CLARION CALL. TR 24719501. 04-04-04 By Ch Igor Vilflorian Of Yoshimi Ch Amerglo Abelia Of Thornwood. Owner: Mrs John Patterson., Palmdale, CA 935512214. Breeder: Owner. (Sheri Martinez, Agent). ENGLISH TOY SPANIELS (BLENHEIM & ...

Journal: :IACR Cryptology ePrint Archive 2012
Farzaneh Abed Eik List Stefan Lucks

PRINCE is a modern involutive lightweight cipher which was proposed by Rechberger et al. in 2012. PRINCE uses 64-bit core cipher, PRINCEcore, which holds the major encryption logic and is wrapped by two key additions. Thus, the security of the cipher is mainly depending on the security properties of the core. In this paper, we present an independent-biclique attack on the full version and also ...

Journal: :IACR Cryptology ePrint Archive 2013
Philipp Jovanovic Martin Kreuzer Ilia Polian

This paper introduces Multi-Stage Fault Attacks, which allow Differential Fault Analysis of block ciphers having independent subkeys. Besides the specification of an algorithm implementing the technique, we show concrete applications to LED-128 and PRINCE and demonstrate that in both cases approximately 3 to 4 fault-injections are enough to reconstruct the full 128-bit key. Keywords-cryptanalys...

Journal: :IACR Cryptology ePrint Archive 2016
Shahram Rasoolzadeh Håvard Raddum

In this paper we focus on the PRINCE block cipher reduced to 6 rounds, with two known plaintext/ciphertext pairs. We develop two attacks on 6-round PRINCE based on accelerated exhaustive search, one with negligible memory usage and one having moderate memory requirements. The time complexities for the two attacks are 2 and 2, respectively. The memory consumption of the second attack is less tha...

Journal: :Brain : a journal of neurology 2015
Carol Dobson-Stone Alex D Shaw Marianne Hallupp Lauren Bartley Heather McCann William S Brooks Clement T Loy Peter R Schofield Karen A Mather Nicole A Kochan Perminder S Sachdev Glenda M Halliday Olivier Piguet John R Hodges John B J Kwok

1 Neuroscience Research Australia, Sydney, NSW, Australia 2 School of Medical Sciences, University of New South Wales, Sydney, NSW, Australia 3 Schizophrenia Research Institute, Sydney, NSW, Australia 4 Prince of Wales Clinical School, University of New South Wales, Sydney, NSW, Australia 5 School of Public Health, University of Sydney, Sydney, NSW, Australia 6 Centre for Healthy Brain Ageing, ...

2005
Tarek Hamrouni Sadok Ben Yahia Yahya Slimani Y. Slimani

Extracting generic bases of association rules seems to be a promising issue in order to present informative and compact user addedvalue knowledge. However, extracting generic bases requires partially ordering costly computed itemset closures. To avoid the nightmarish itemset closure computation cost, specially for sparse contexts, we introduce an algorithm, called Prince, allowing an astute ext...

Journal: :RUDN Journal of Russian History 2022

This article, for the first time in domestic and foreign historiography, examines coverage by press of visits Bulgarian prince Ferdinand Coburg to Russia at end 19th century. After death Alexander III, Bulgaria began take steps order restore relations with Russia. Personal diplomacy was great importance such situations. baptism Prince Boris into Orthodox faith, visit St. Petersburg I took place...

2005
Tarek Hamrouni Sadok Ben Yahia Yahya Slimani

The problem of the relevance and the usefulness of extracted association rules is becoming of primary importance, since an overwhelming number of association rules may be derived, even from reasonably sized databases. To overcome such drawback, the extraction of reduced size generic bases of association rules seems to be promising. Using the concept of minimal generator, we propose an algorithm...

2015
Patrick Derbez Léo Perrin

NXP Semiconductors and its academic partners challenged the cryptographic community with nding practical attacks on the block cipher they designed, PRINCE. Instead of trying to attack as many rounds as possible using attacks which are usually impractical despite being faster than brute-force, the challenge invites cryptographers to nd practical attacks and encourages them to actually implement ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید