نتایج جستجو برای: caesar
تعداد نتایج: 799 فیلتر نتایج به سال:
We show that a distinguishing attack in the related key model on an EvenMansour block cipher can readily be converted into an extremely efficient key recovery attack. Concerned ciphers include in particular all iterated Even-Mansour schemes with independent keys. We apply this observation to the Caesar candidate Prøst-OTR and are able to recover the whole key with a number of requests linear in...
HANUMAN is a mode of operation of a keyless cryptographic permutation for nonce-based authenticated encryption with associated data, included among the modes bundled in the PRIMATEs candidate in the currently ongoing CAESAR competition. HANUMAN is a sponge-like mode whose design and security argument are inspired by the SpongeWrap construction. We identify a flaw in the domain separation of HAN...
Cache coherentnon-uniform memory access (CC-NUMA) multiprocessors continue to suffer from remote memory access latencies due to comparatively slow memory technology and data transfer latencies in the interconnection network. In this paper, we propose a novel hardware caching technique, called switch cache. The main idea is to implement small fast caches in crossbar switches of the interconnect ...
Differential and linear cryptanalysis are the general purpose tools to analyze various cryptographic primitives. Both techniques have in common that they rely on the existence of good differential or linear characteristics. The difficulty of finding such characteristics depends on the primitive. For instance, AES is designed to be resistant against differential and linear attacks and therefore,...
To consider the evolutionary origin of the ectoparasitic habit in the blowfly genus Lucilia (Diptera:Calliphoridae), phylogenetic analyses of mitochondrial DNA sequence data were performed for 10 species, including all the common Lucilia agents of myiasis, collected from Africa, Australasia, North America and Europe. Complementary genetic distance and parsimony analyses are used to consider int...
In this paper, the authors propose a new combined symmetric key cryptographic method, SJA-I, which basically has four steps: Firstly, each byte is broken into its equivalent binary format and then single bit manipulation is executed on that; secondly Modified Caesar Cipher technique (SD-REE) and TTJSA cipher algorithm are applied on the data (message) randomly, which depends on the key provided...
The CAESAR (Civilian American and European Surface Anthropometry Resource) project completed in 2002 has collected 3D scans of over 5000 subjects. We have created several 3D visualization tools, utilizing the Virtual Reality Modeling Language (VRML) to provide 3D access via the Web. In addition to simply viewing the 3D scans we have augmented the display of the body with interactive anthropomet...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید