نتایج جستجو برای: truncated

تعداد نتایج: 32383  

1999
Shiho Moriai

This paper studies the security offered by E2 against truncated differential attack. At FSE’99, Matsui and Tokita presented a paper on this. They showed a possible attack on an 8round variant of E2 without IT and FT -Functions. To check their results and confirm that the full E2 is secure against this type of cryptanalysis, we developed a search algorithm to find all byte characteristics that l...

2011
Hanae Katayama Hanae KATAYAMA

Using Goffman’s (1981) participation framework and Brown & Levinson’s (1987) politeness theory, this study examines stand-up comedy in the U.S. and Japan and demonstrates pervasive patterns of communication in comedy performance. In the U.S., stand-up acts are comprised of solo comedian’s narrative performance, while stand-up comic narrative in Japan is performed in the form of dialogue between...

2001
L. Z. Sun Z. Q. Wang

Understanding flow localization in materials containing high concentrations of Stacking Fault Tetrahedra (SFT’s) depends on delineation of the mechanisms by which they are destroyed as effective dislocation obstacles. The elastic interaction between glissile dislocations and SFT’s in FCC metals is examined, both analytically and numerically. Numerical calculations are performed for both full an...

Journal: :IACR Cryptology ePrint Archive 2016
Lorenzo Grassi Christian Rechberger

Subspace trail cryptanalysis is a very recent new cryptanalysis technique, and includes differential, truncated differential, impossible differential, and integral attacks as special cases. In this paper, we consider PRINCE, a widely analyzed block cipher proposed in 2012. After the identification of a 2.5 rounds subspace trail of PRINCE, we present several (truncated differential) attacks up t...

Journal: :IACR Cryptology ePrint Archive 2005
Paul Crowley

We present an attack on Salsa20 reduced to five of its twenty rounds. This attack uses many clusters of truncated differentials and requires 2 work and 2 plaintexts. 1 Definition of Salsa20 Salsa20 [1] is a candidate in the eSTREAM project to identify new stream ciphers that might be suitable for widespread adoption. For convenience, we recap here the parameterized family of variants Salsa20-w/...

2014
Eric A. Johnson Selena L. Rice Matthew R. Preimesberger Dillon B. Nye Lukas Gilevicius Belinda B. Wenke Jason M. Brown George B. Witman Juliette T. J. Lecomte

The nuclear genome of the model organism Chlamydomonas reinhardtii contains genes for a dozen hemoglobins of the truncated lineage. Of those, THB1 is known to be expressed, but the product and its function have not yet been characterized. We present mutagenesis, optical, and nuclear magnetic resonance data for the recombinant protein and show that at pH near neutral in the absence of added liga...

1999
Christopher M. Quale Mark J. van der Laan

In this paper we build on previous work for estimation of the bivariate distribution of the time variables T1 and T2 when they are observable only on the condition that one of the time variables, say T1, is greater than (lefttruncation) or less than (right truncation) some observed time variable C1. In this paper, we introduce several results based on the In uence Curve (which we derive in this...

2009
MICHAEL PETERS

Workers and firms in a bilateral matching market choose wages and human capital investments then match assortatively. This paper studies Bayesian equilibria of finite matching games and shows that as the matching market becomes large, Bayesian equilibria can be approximated by a truncated hedonic equilibrium in the continuous matching market. We use the truncated hedonic equilibrium concept to ...

2005
DONALD YAU

The λ-ring cohomology, H λ and H 1 λ, of certain truncated polynomial filtered λ-rings are computed.

Journal: :Artif. Intell. 2016
Sandip Aine Maxim Likhachev

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید