نتایج جستجو برای: aes

تعداد نتایج: 8770  

2013
A. Oglesby A. J. Shaul T. Pokora C. Paramore L. Cragin G. Dennis S. Narayanan A. Weinstein

This paper assessed the burden of adverse events (AEs) associated with azathioprine (AZA), cyclophosphamide (CYC), mycophenolate mofetil (MMF), methotrexate (MTX), and cyclosporine (CsA) in patients with systemic lupus erythematosus (SLE). Thirty-eight publications were included. Incidence of AEs ranged from 42.8% to 97.3%. Common AEs included infections (2.4-77%), gastrointestinal AEs (3.2-66....

2002
SHIRLEY H. Y. HUNG

Spiroplasma strain AES-1, which was isolated from the salt marsh mosquito Aedes sollicitans, is the monotypic representative of group X. This strain differed in serological reactivity, growth pattern, and morphology from previously described spiroplasmas. Most cells of strain AES-1 were nonhelical; helical cells were about 1 to 2 p m long and rarely had more than one or two turns. Optimal growt...

Journal: :IACR Trans. Symmetric Cryptol. 2016
Khoongming Khoo Eugene Lee Thomas Peyrin Siang Meng Sim

The related-key model is now considered an important scenario for block cipher security and many schemes were broken in this model, even AES-192 and AES-256. Recently were introduced e cient computer-based search tools that can produce the best possible relatedkey truncated di erential paths for AES. However, one has to trust the implementation of these tools and they do not provide any meaning...

2017
Dorthe O. Klein Roger J.M.W. Rennenberg Richard P. Koopmans Martin H. Prins

Several trigger systems have been developed to screen medical records of hospitalized patients for adverse events (AEs). Because it's too labor-intensive to screen the records of all patients, usually a sample is screened. Our sample consists of patients who died during their stay because chances of finding preventable AEs in this subset are highest. Records were reviewed for fifteen triggers (...

2008
Paul Hougland Jonathan Nebeker Steve Pickard Mark Van Tuinen Susan Elder Scott Williams

Background: Adverse events (AEs) are significant and common sources of harm to inpatients. International Classification of Diseases, 9 Revision, Clinical Modification (ICD-9-CM) codes, assigned to virtually all inpatient discharges, could provide a readily available surveillance system capable of detecting a variety of AEs. Objectives: To determine the positive predictive value (PPV) of selecte...

Journal: :Journal of medical microbiology 2008
Jim Manos Jonathan Arthur Barbara Rose Pholawat Tingpej Carina Fung Michelle Curtis Jeremy S Webb Honghua Hu Staffan Kjelleberg Mark D Gorrell Peter Bye Colin Harbour

Transmissible Pseudomonas aeruginosa clones potentially pose a serious threat to cystic fibrosis (CF) patients. The AES-1 clone has been found to infect up to 40 % of patients in five CF centres in eastern Australia. Studies were carried out on clonal and non-clonal (NC) isolates from chronically infected CF patients, and the reference strain PAO1, to gain insight into the properties of AES-1. ...

Journal: :CoRR 2010
Anna Rimoldi Massimiliano Sala Enrico Bertolazzi

The Advanced Encryption Standard (AES) is widely recognized as the most important block cipher in common use nowadays. This high assurance in AES is given by its resistance to ten years of extensive cryptanalysis, that has shown no weakness, not even any deviation from the statistical behaviour expected from a random permutation. Only reduced versions of the ciphers have been broken, but they a...

Journal: :IACR Cryptology ePrint Archive 2011
Dmitry Khovratovich Christian Rechberger

Since Rijndael was chosen as the Advanced Encryption Standard, improving upon 7-round attacks on the 128-bit key variant or upon 8-round attacks on the 256-bit key variant has been one of the most difficult challenges in the cryptanalysis of block ciphers for more than a decade. In this paper we present a novel technique of block cipher cryptanalysis with bicliques, which leads to the following...

Journal: :IACR Trans. Symmetric Cryptol. 2016
Lorenzo Grassi Christian Rechberger Sondre Rønjom

We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a potentially more powerful attack vector. Interestingly, subspace trail cryptanalysis in fact includes techniques based on impossible or truncate...

زمردیان, علیرضا,

Thin films of superconductor YBaCuO(YBCO) and Pb(ZrTi)O(PZT) is grown by laser ablation technique to make an electronic device. The quality and the structure of the films is studied by X-ray diffraction (XRD) and Auger Electron Spectroscopy (AES). A quantitative analysis of the films is also deduced from AES study. Analysis of the films show that the YBCO is grown in (001) and PZT in (10...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید