نتایج جستجو برای: grain security
تعداد نتایج: 239212 فیلتر نتایج به سال:
this research is about the political economy of china in central asia. in this research the political & economic interactions affected on chinas political economy in central asia are examined. chinas goal of presence in central asia including political-security, economic and energy goals is described in one part. in another part, the trade relations between china and central asian countries ar...
Since the security analysis against stream ciphers becomes more difficult nowadays, it is urgent and significant to propose new generic methods. In this work, we introduce guess-and-determine techniques to two traditional analysis methods and make the new approaches methodological for generalization. We show the power of the new methods by analyzing two stream ciphers: Grain-v1 and ACORN. Grain...
In developing countries, like Vietnam, it is vital to ensure high quality of grain with traceable origins, because grain is of paramount importance for business and food security purposes. However, it is very challenging to build information systems to track, monitor, analyze and manage grain warehouses in scattered flood of Mekong delta Vietnam, given under developed physical and informational...
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (like E0, A5/1, Trivium, Grain) to 2 n, where n denotes the inner state length of the underlying keystream generator. In this paper, we present Lizard, a lightweight stream cipher for power-constrained devices like passive RFID tags. Its hardware efficiency results from combining a Grain-like desig...
In recent years, food security, especially supply, has been an important issue in China’s agricultural production. The stability of grain prices is related to the stability and development of the grain market. Based on agricultural production data from 1970 to 2015, this paper explores the influence of agricultural product price fluctuation on grain production by using the cobweb theory and vec...
A common approach to protect confidential information is to use a stream cipher which combines plain text bits with a pseudo-random bit sequence. Among the existing stream ciphers, Non-Linear Feedback Shift Register (NLFSR)based ones provide the best trade-off between cryptographic security and hardware efficiency. In this paper, we show how to further improve the hardware efficiency of Grain s...
Food security commands much attention from policy makers and economists in China as well as in other less developed countries. Following WTO accession, the impact of trade liberalization has also received much comment, particularly the linkage between food security and opening the border to more agricultural trade. To better understand how food security is affected by trade policies, this paper...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید