نتایج جستجو برای: rodent attacks
تعداد نتایج: 84575 فیلتر نتایج به سال:
In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main emphasis is on the use of chaotic maps to boost the algorithms’ security and resistance against attacks. By encrypting the watermark information in a one dimensional chaotic map, we make the extraction of watermark for potential attackers very hard. In another approach, we select embedding po...
ΑΕS _ CMCCv₁, ΑVΑLΑNCHEv₁, CLΟCv₁, and SILCv₁ are four candidates of the first round of CAESAR. CLΟCv₁ is presented in FSE 2014 and SILCv₁ is designed upon it with the aim of optimizing the hardware implementation cost. In this paper, structural weaknesses of these candidates are studied. We present distinguishing attacks against ΑES _ CMCCv₁ with the complexity of two queries and the success ...
Gil Kalai introduced the shifting-theoretic upper bound relation to characterize the f -vectors of Gorenstein* complexes (or homology spheres) by using algebraic shifting. In the present paper, we study the shifting-theoretic upper bound relation. First, we will study the relation between exterior algebraic shifting and combinatorial shifting. Second, by using the relation above, we will prove ...
We introduce in this article a new method to calculate all absolute and relatif primitive invariants of finite groups. This method is inspired from K. Girstmair which calculate an absolute primitive invariant of minimal degree. Are presented two algorithms, the first one enable us to calculate all primitive invariants of minimal degree, and the second one calculate all absolute or relative prim...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید