نتایج جستجو برای: mutamid 256
تعداد نتایج: 12691 فیلتر نتایج به سال:
A 256 X 256 CMOS photo-gate active pixel image sensor is presented. The image sensor uses four MOS transistors within each pixel to buffer the photo-signal, enhance sensitivity, and suppress noise. The pixel size is 20 im X 20 jm and was implemented in a standard digital 0.9 pm single-polysilicon, double-metal, n-well CMOS process; leading to 25% fill-factor. Row and column decoders and counter...
In this paper, we introduce a new dedicated 256-bit hash function: NESHA-256. The recently contest for hash functions held by NIST, motivates us to design the new hash function which has a parallel structure. Advantages of parallel structures and also using some ideas from the designing procedure of block-cipher-based hash functions strengthen our proposed hash function both in security and in ...
This paper compares the software speeds of 128-bit 10-round AES, 256-bit 14-round AES, 256-bit CryptMT v3, 256-bit Dragon, 128bit HC-128, 256-bit HC-256, 128-bit LEX v1, 128-bit NLS v2, 128bit Rabbit, 256-bit RC4, 256-bit Salsa20/8, 256-bit Salsa20/12, 256-bit Salsa20/20, 256-bit SNOW 2.0, 256-bit Sosemanuk, and 80-bit TRIV-
HC-256 is a software-efficient stream cipher. It generates keystream from a 256-bit secret key and a 256-bit initialization vector. The encryption speed of the C implementation of HC-256 is about 1.9 bits per clock cycle (4.2 cycles/byte) on the Intel Pentium 4 processor.
This paper evaluates and compares several stream ciphers that use 256-bit keys: counter-mode AES, CryptMT, DICING, Dragon, FUBUKI, HC-256, Phelix, Py, Py6, Salsa20, SOSEMANUK, VEST, and YAMB.
The hash function FORK-256 was published at the first NIST hash workshop and FSE 2006. It consists of simple operations so that its performance is better than that of SHA-256. However, recent papers show some weaknesses of FORK-256. In this paper, we propose newly modified FORK-256 which has no microcoliisions and so is resistant against existing attacks. Furthermore, it is faster than the old ...
There is increasing evidence that pregnancy alters the function of drug-metabolizing enzymes and drug transporters in a gestationalstage and tissue-specific manner. In vivo probe studies have shown that the activity of several hepatic cytochrome P450 enzymes, such as CYP2D6 and CYP3A4, is increased during pregnancy, whereas the activity of others, such as CYP1A2, is decreased. The activity of s...
Progressive growth of the Walker carcinoma @56 produces a caloric deficit in young adult, male, albino rats. The excessive expenditure of calories is not due solely to decreased food intake, for tumor-bearing rats lose more calories than do pair-fed noncancerous rats of the same age, sex, and initial weight. This result was anticipated by a previous report that rats in which the Walker tumor gr...
CellHash [3] and SubHash [4] were suggested by J. Daemen, R. Govaerts and J. Vandewalle in 1991 and 1992. SubHash is an improved version from CellHash. They have 257-bit internal state and 256-bit hash output. In this paper, we show a preimage attack on CellHash (SubHash) with the complexity 2 and the memory 2 for any t (with the complexity about 2 and the memory size 2). Even though we modify ...
Earlier it has been reported that there exist correlation attacks on RC6 with 128-bit blocks with a reduced number of rounds. In this note it is investigated how well RC6 with 256-bit blocks resists such attacks.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید