نتایج جستجو برای: الگوریتم aes

تعداد نتایج: 31104  

2012
Yoni De Mulder Peter Roelse Bart Preneel

In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted platform, the adversary has full access to the implementation and its execution environment. In 2002, Chow et al. presented a white-box AES implementation which aims at preventing key-extraction in the white-box attack context. However, in 2004, Billet et al. prese...

2012
P Posadzki E Ernst

AIM The aim of this systematic review was to critically evaluate the evidence regarding the adverse effects (AEs) of homeopathy. METHOD Five electronic databases were searched to identify all relevant case reports and case series. RESULTS In total, 38 primary reports met our inclusion criteria. Of those, 30 pertained to direct AEs of homeopathic remedies; and eight were related to AEs cause...

2014
Erin Dawna Reilly Rose Eleanore Stafford Kyle Marie Williams Stephanie Brooks Corliss

The use of massive open online courses (MOOCs) to expand students’ access to higher education has raised questions regarding the extent to which this course model can provide and assess authentic, higher level student learning. In response to this need, MOOC platforms have begun utilizing automated essay scoring (AES) systems that allow students to engage in critical writing and free-response a...

2014
Pritamkumar N. Khose Vrushali G. Raut

An AES algorithm is implemented on FPGA platform to improve the safety of data in transmission. AES algorithms can be implemented on FPGA in order to speed data processing and reduce time for key generating. We achieve higher performance by maintaining standard speed and reliability with low area and power. The 128 bit AES algorithm is implements on a FPGA using VHDL language with help of Xilin...

Journal: :IACR Cryptology ePrint Archive 2012
Nuray At Jean-Luc Beuchat Eiji Okamoto Ismail San Teppei Yamazaki

This article describes the design of an 8-bit coprocessor for the AES (encryption, decryption, and key expansion) and the cryptographic hash function Grøstl on several Xilinx FPGAs. Our Arithmetic and Logic Unit performs a single instruction that allows for implementing AES encryption, AES decryption, AES key expansion, and Grøstl at all levels of security. Thanks to a careful organization of A...

Journal: :FEBS letters 1998
A Giuffrida D Piomelli

Anandamide and allied fatty acylethanolamides (AEs) may act as signalling molecules in brain and peripheral tissues. In the present study, we describe an electron-impact gas chromatography/mass spectrometry (GC/MS) method based on isotope dilution, which may be used for the identification and quantification of anandamide and other AEs in biological matrices. The calibration curves for standard ...

2012
Cyril Roscian Florian Praden Jean-Max Dutertre Jacques Fournier Assia Tria

The AES is a standard encryption algorithm used in numerous cryptographic systems like smart cards, TPMs as well as in protocols like WPA2 or OpenSSL. Measuring the robustness of AES implementations against physical attacks is of utmost import-ance in order to guarantee the security of the system into which the AES is used. In this article, we describe how a hardware AES, embedding countermeasu...

Journal: :The American journal of tropical medicine and hygiene 2017
Jeromie Wesley Vivian Thangaraj Mahima Mittal Valsan Philip Verghese C P Girish Kumar Winsley Rose R Sabarinathan Ashok Kumar Pandey Nivedita Gupta Manoj Murhekar

Seasonal outbreaks of acute encephalitis syndrome (AES) with high mortality occur every year in Gorakhpur region of Uttar Pradesh, India. Earlier studies indicated the role of scrub typhus as the important etiology of AES in the region. AES cases were hospitalized late in the course of their illness. We established surveillance for acute febrile illness (AFI) (fever ≥ 4 days duration) in periph...

Journal: :IACR Cryptology ePrint Archive 2010
Yang Li Shigeto Gomisawa Kazuo Sakiyama Kazuo Ohta

Differential Fault Analysis against AES has been actively studied these years. Based on similar assumptions of the fault injection, different DFA attacks against AES have been proposed. However, it is difficult to understand how different attack results are obtained for the same fault injection. It is also difficult to understand the relationship between similar assumptions of fault injection a...

1998
Nelson H. F. Beebe

abelian [326, 408, 91, 337]. Abstract [117]. Accelerated [512]. Accelerating [398]. Achieve [477]. Acoustic [525]. Adaptive [241, 390, 471]. Adaptively [523, 390]. Adic [130]. Advance [279]. Adversarial [458]. Adversaries [353, 345, 357, 403, 450, 472, 501, 236]. Adversary [173]. AES [373, 474, 346, 459]. AES-192 [474]. AES-256 [474]. AES-like [459]. after [76]. Against [353, 480, 520, 348, 500...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید