نتایج جستجو برای: caesar

تعداد نتایج: 799  

Journal: :IACR Cryptology ePrint Archive 2015
Pierre Karpman

We show that a distinguishing attack in the related key model on an EvenMansour block cipher can readily be converted into an extremely efficient key recovery attack. Concerned ciphers include in particular all iterated Even-Mansour schemes with independent keys. We apply this observation to the Caesar candidate Prøst-OTR and are able to recover the whole key with a number of requests linear in...

Journal: :IACR Cryptology ePrint Archive 2016
Damian Vizár

HANUMAN is a mode of operation of a keyless cryptographic permutation for nonce-based authenticated encryption with associated data, included among the modes bundled in the PRIMATEs candidate in the currently ongoing CAESAR competition. HANUMAN is a sponge-like mode whose design and security argument are inspired by the SpongeWrap construction. We identify a flaw in the domain separation of HAN...

Journal: :Scene: Reviews of Early Modern Drama 2019

Journal: :Journal on Advances in Theoretical and Applied Informatics 2015

1999
Ravi R. Iyer Laxmi N. Bhuyan

Cache coherentnon-uniform memory access (CC-NUMA) multiprocessors continue to suffer from remote memory access latencies due to comparatively slow memory technology and data transfer latencies in the interconnection network. In this paper, we propose a novel hardware caching technique, called switch cache. The main idea is to implement small fast caches in crossbar switches of the interconnect ...

Journal: :IACR Cryptology ePrint Archive 2015
Christoph Dobraunig Maria Eichlseder Florian Mendel

Differential and linear cryptanalysis are the general purpose tools to analyze various cryptographic primitives. Both techniques have in common that they rely on the existence of good differential or linear characteristics. The difficulty of finding such characteristics depends on the primitive. For instance, AES is designed to be resistant against differential and linear attacks and therefore,...

Journal: :International journal for parasitology 1997
J Stevens R Wall

To consider the evolutionary origin of the ectoparasitic habit in the blowfly genus Lucilia (Diptera:Calliphoridae), phylogenetic analyses of mitochondrial DNA sequence data were performed for 10 species, including all the common Lucilia agents of myiasis, collected from Africa, Australasia, North America and Europe. Complementary genetic distance and parsimony analyses are used to consider int...

2012
Somdip Dey Joyshree Nath Asoke Nath

In this paper, the authors propose a new combined symmetric key cryptographic method, SJA-I, which basically has four steps: Firstly, each byte is broken into its equivalent binary format and then single bit manipulation is executed on that; secondly Modified Caesar Cipher technique (SD-REE) and TTJSA cipher algorithm are applied on the data (message) randomly, which depends on the key provided...

2003
Sandy Ressler Qiming Wang

The CAESAR (Civilian American and European Surface Anthropometry Resource) project completed in 2002 has collected 3D scans of over 5000 subjects. We have created several 3D visualization tools, utilizing the Virtual Reality Modeling Language (VRML) to provide 3D access via the Web. In addition to simply viewing the 3D scans we have augmented the display of the body with interactive anthropomet...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید