نتایج جستجو برای: mutamid 256
تعداد نتایج: 12691 فیلتر نتایج به سال:
We report the successful development of hybrid PIN diode arrays and a series of room-temperature measurements in a high-energy pion beam at FNAL. A PMOS VLSI 256 x 256 readout array having 30 pm square pixels was indiumbump bonded to a mating PIN diode detector array. Preliminary measurements on the resulting hybrid show excellent signal-to-noise at room temperature.
The “PYRAMIDS” Block Cipher is a symmetric encryption algorithm of a 64, 128, 256-bit plaintext block, that accepts a variable key length of 128, 192, 256 bits. The algorithm is an iterated cipher consisting of repeated applications of simple round transformations with different operations and different sequences in each round.
In this paper we study the security of hash functions SM3 and BLAKE-256 against boomerang attack. SM3 is designed by X. Wang et al. and published by Chinese Commercial Cryptography Administration Office for the use of electronic certification service system in China. BLAKE is one of the five finalists of the NIST SHA-3 competition submitted by J.-P. Aumasson et al. For SM3, we present boomerang...
In this paper we construct a chosen-key distinguisher and a related-key attack on the full 256-bit key AES. We define a notion of differential q-multicollision and show that for AES-256 q-multicollisions can be constructed in time q ·2 and with negligible memory, while we prove that the same task for an ideal cipher of the same block size would require at least O(q · 2 q−1 q+1 ) time. Using sim...
In this paper, we present improved preimage attacks on the reduced-round GOST hash function family, which serves as the new Russian hash standard, with the aid of techniques such as the rebound attack, the Meet-in-the-Middle preimage attack and the multicollisions. Firstly, the preimage attack on 5-round GOST-256 is proposed which is the first preimage attack for GOST-256 at the hash function l...
j-lanes hashing is a tree mode that splits an input message to j slices, computes j independent digests of each slice, and outputs the hash value of their concatenation. We demonstrate the performance advantage of j-lanes hashing on SIMD architectures, by coding a 4-lanes-SHA-256 implementation and measuring its performance on the latest 3 Generation Intel Core. For message ranging 2KB to 132KB...
The present study aimed at characterizing the subcutaneous development of the Walker 256 (W256) AR tumor, a regressive variant of the rat W256 A tumor. Wistar rats were injected subcutaneously with 4x10 W256 A or W256 AR tumor cells. The development of tumors was evaluated daily by percutaneous measurements. None of the W256 A tumors (n=20) regressed, but 62% of the W256 AR tumor-bearing rats (...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید