نتایج جستجو برای: caesar

تعداد نتایج: 799  

2011
Thomas Timm Jens Peter von Kries Xiaoyu Li Hans Zempel Eckhard Mandelkow Eva-Maria Mandelkow

Thomas Timm, Jens Peter von Kries, Xiaoyu Li, Hans Zempel, Eckhard Mandelkow, and Eva-Maria Mandelkow From the Max-Planck-Unit for Structural Molecular Biology, c/o DESY, Notkestrasse 85, 22607 Hamburg, Germany, FMP, Forschungsinstitut fuer Molekulare Pharmakologie, Robert-Roessle-Strasse 10, 13125 Berlin, Germany, and the DZNE (German Center for Neurodegenerative Diseases) and CAESAR (Center o...

Journal: :Philologus 2022

Abstract In response to Caesar, who intends reach Antonius in Italy, the boatman Amyclas sets out celestial and terrestrial signs that foretell a storm advises against putting sea (Luc. 5.539‒560). this speech Lucan draws on treatment of such phenomena didactic poems Aratus Vergil, but allusions are remodelled epic language adapted narrative context episode. Further, story develops dramatic ide...

Journal: :Jurnal Ners 2023

Latar Belakang : Enhanced Recovery After Caesarian Surgery merupakan program pemulihan pasca operasi caesar yang dinilai dapat memberikan banyak manfaat. Konsep ERACS pengembangan dari konsep Surgery, dimana ERAS ini awalnya digunakan pada bedah digestif. terbukti mengurangi lama rawat pasien di rumah sakit, komplikasi operatif, dan meningkatkan kepuasan pasien. Oleh karena itu kemudian dikemba...

2017
Xavier Bonnetain

AEZ is an authenticated encryption algorithm, submitted to the CAESAR competition. It has been selected for the third round of the competition. While some classical analysis on the algorithm have been published, the cost of these attacks is beyond the security claimed by the designers. In this paper, we show that all the versions of AEZ are completely broken against a quantum adversary. For thi...

2005
Karl Matthias Hamel Klaus Ostermann

This paper investigates the usage of aspect-oriented techniques to increase the modularity and reusability of algorithms. We present a set of criteria to evaluate the modularity and reusability of algorithm implementations and argue that current algorithm libraries have serious limitations with respect to these criteria. We have implemented a small algorithm library using the aspectoriented lan...

Journal: :IACR Cryptology ePrint Archive 2015
Ekawat Homsirikamol William Diehl Ahmed Ferozpuri Farnoud Farahmand Umar Sharif Kris Gaj

In this paper, we propose a universal hardware Application Programming Interface (API) for authenticated ciphers. In particular, our API is intended to meet the requirements of all algorithms submitted to the CAESAR competition. Two major parts of the API, the interface and the communication protocol, were developed with the goal of reducing any potential biases in benchmarking of authenticated...

Journal: :IACR Cryptology ePrint Archive 2014
Xiutao Feng Fan Zhang

FASER is a family of authenticated ciphers submitted to the CAESAR competition, which contains two parent ciphers: FASER128 and FASER256. In this work we only focus on FASER128 and present a key recovery attack to FASER128, which needs at most 64 key words and is realtime in a PC. The result shows that FASER128 is very insecure. What’s more, our attack can be easily applied to FASER256 and brea...

Journal: :Dermatologic clinics 2008
Bruce Katz Jason McBean

The age-old spa concept is no less valuable today than it was during the time of Julius Caesar. Over the centuries, there have been many iterations of the concept of the spa. The most recent is the medical spa, which has become the fastest-growing segment of the spa industry. Many physicians including dermatologists wish to incorporate a medical spa into their practices. This article discusses ...

2014
Hossein HOSSEINI Shahram KHAZAEI Hossein Hosseini Shahram Khazaei

This paper presents the Code-Book Authentication mode (CBA), a submission to the CAESAR competition for authenticated encryption. CBA is a blockcipher mode of encryption that provides confidentiality and authenticity for plaintexts and authenticity for associated data. The proposed mode improves the OCB mode in the sense that it saves up to one blockcipher call to encrypt and authenticate the p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید