نتایج جستجو برای: رمزنگار aes

تعداد نتایج: 8783  

Journal: :IACR Cryptology ePrint Archive 2004
Debra L. Cook Moti Yung Angelos D. Keromytis

Recently an algorithmic schema was proposed for converting any existing block cipher into one which excepts variable length inputs with the computational workload increasing in proportion to the block size. The resulting cipher is referred to as an elastic block cipher. The initial work presented immunity to certain key recovery attacks, and left open further analysis of the method and its poss...

2014
Lorenzo Sommella Chiara de Waure Anna Maria Ferriero Amalia Biasco Maria Teresa Mainelli Luigi Pinnarelli Walter Ricciardi Gianfranco Damiani

BACKGROUND The promotion of safer healthcare interventions in hospitals is a relevant public health topic. This study is aimed to investigate predictors of Adverse Events (AEs) taking into consideration the Charlson Index in order to control for confounding biases related to comorbidity. METHODS The study was a retrospective cohort study based on a two-stage assessment tool which was used to ...

2017
Zhen Hong Wang Hong Fang Mouhui Chen

INTRODUCTION Rhizospheres, the most active interfaces between plants and soils, play a central role in the long-term maintenance of the biosphere. The anti-erodibility of soils (AES) regulated by the root exudates is crucial to the soil stability in the rhizospheres. However, scientists still debate (1) the key organic matter of the root exudates affecting the AES and (2) the interspecific vari...

2012
Alberto Pagnamenta Giovanni Rabito Alessandra Arosio Andreas Perren Roberto Malacrida Fabrizio Barazzoni Guido Domenighetti

UNLABELLED BACKGROUND Adverse events (AEs) frequently occur in intensive care units (ICUs) and affect negatively patient outcomes. Targeted improvement strategies for patient safety are difficult to evaluate because of the intrinsic limitations of reporting crude AE rates. Single interventions influence positively the quality of care, but a multifaceted approach has been tested only in selec...

Journal: :Journal of Advanced Research in Natural and Applied Sciences 2022

Ad hoc networks have become more widespread and important because they support mobility can be used in different situations some difficult areas such as rescue missions, military, vehicular communications. Security is stated among the most significant challenges facing Hoc due to its characteristic features topology dynamicity, lack of infrastructure centralization, open architecture. work on b...

2011
D. McGrew

This memo describes the use of the Advanced Encryption Standard (AES) with 192and 256-bit keys within the Secure RTP (SRTP) protocol. It details counter mode encryption for SRTP and Secure Realtime Transport Control Protocol (SRTCP) and a new SRTP Key Derivation Function (KDF) for AES-192 and AES-256.

Journal: :CoRR 2012
Sliman Arrag Abdellatif Hamdoun Abderrahim Tragha Salah eddine Khamlich

This paper provides four different architectures for encrypting and decrypting 128 bit information via the AES. The encryption algorithm includes the Key Expansion module which generates Key for all iterations on the fly, Double AEStwo-key triple AES, AESX and AES-EXE. These architectures are implemented and studied in Altera Cyclone III and STRATIX Family devices.

2003
Song J. Park

Following paper examines hardware implementation methods regarding Advanced Encryption Standard (AES). Compared to software implementation, migrating to hardware provides higher level of security and faster encryption speed. An overview of existing AES hardware implementation techniques are summarized. Then the direction of reconfigurable coprocessor as a cryptography hardware is proposed. Keyw...

2004
Andreas Schuster Elisabeth Oswald

The AES is still the ”State of the Art” cryptographic algorithm, and power analysis attacks had shown that breaking traditionally said high secure ciphers (like AES) is done with a relative low effort. This paper describes how to perform such an attack on an AES implementation.

2004
Alex Biryukov

In this note we study security of 128-bit key 10-round AES against the boomerang attack. We show attacks on AES reduced to 5 and 6 rounds, much faster than the exhaustive key search and twice faster than the “Square” attack of the AES designers. The attacks are structural and apply to other SPN ciphers with incomplete diffusion.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید