نتایج جستجو برای: 128
تعداد نتایج: 21232 فیلتر نتایج به سال:
We determine the imbalances of the keystreams produced by Achterbahn-80 and Achterbahn-128 in two different ways. The number of cyclically inequivalent keystreams produced by the keystream generators of Achterbahn-80 and Achterbahn-128 is determined. An abstract model for the keystream generator of a primitive NLFSR combination generator is used to justify the correlation attack introduced in [...
HC-128 is a high speed stream cipher with a 128-bit secret key and a 128-bit initialization vector. It has passed all the three stages of the ECRYPT stream cipher project and is a member of the eSTREAM software portfolio. In this paper, we present a differential fault analysis attack on HC-128. The fault model in which we analyze the cipher is the one in which the attacker is able to fault a ra...
The authors examined how timing accuracy in tapping sequences is influenced by sequential effects of preceding finger movements and biomechanical interdependencies among fingers. Skilled pianists tapped sequences at 3 rates; in each sequence, a finger whose motion was more or less independent of other fingers’ motion was preceded by a finger to which it was more or less coupled. Less independen...
Novel species of microfungi described in the present study include the following from Australia: Catenulostroma corymbiae from Corymbia, Devriesia stirlingiae from Stirlingia, Penidiella carpentariae from Carpentaria, Phaeococcomyces eucalypti from Eucalyptus, Phialophora livistonae from Livistona, Phyllosticta aristolochiicola from Aristolochia, Clitopilus austroprunulus on sclerophyll forest ...
We propose a new block cipher, DEAL, based on the DES (DEA). DEAL has a block size of 128 bits and allows for three key sizes of 128, 192, and 256 bits respectively. Our proposal has several advantages to other schemes: because of the large blocks, the problem of the \matching ciphertext attacks" is made small, and the encryption rate is similar to that of triple-DES. We conjecture that the mos...
Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such light weight hash function proposed by Peris-Lopez et al. for an RFID authentication protocol. In this article we show that Tav-128 is not collision resistant. We show a practical collision attack ag...
ICEPOLE is a family of authenticated encryptions schemes submitted to the ongoing CAESAR competition and in addition presented at CHES 2014. To justify the use of ICEPOLE, or to point out potential weaknesses, third-party cryptanalysis is needed. In this work, we evaluate the resistance of ICEPOLE-128 against forgery attacks. By using differential cryptanalysis, we are able to create forgeries ...
In this work, we study theoretically the operation of long surface acoustic wave reflectors, comprising a large number of electrodes, at the fundamental and second harmonic frequencies on the 128 LiNbO3 substrate for various electrode thicknesses and metallization ratios. Numerical simulations utilizing tailored test structures and time gating indicate that the reflectivity of the second-harmon...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید