نتایج جستجو برای: رمزنگار aes
تعداد نتایج: 8783 فیلتر نتایج به سال:
Recently an algorithmic schema was proposed for converting any existing block cipher into one which excepts variable length inputs with the computational workload increasing in proportion to the block size. The resulting cipher is referred to as an elastic block cipher. The initial work presented immunity to certain key recovery attacks, and left open further analysis of the method and its poss...
BACKGROUND The promotion of safer healthcare interventions in hospitals is a relevant public health topic. This study is aimed to investigate predictors of Adverse Events (AEs) taking into consideration the Charlson Index in order to control for confounding biases related to comorbidity. METHODS The study was a retrospective cohort study based on a two-stage assessment tool which was used to ...
INTRODUCTION Rhizospheres, the most active interfaces between plants and soils, play a central role in the long-term maintenance of the biosphere. The anti-erodibility of soils (AES) regulated by the root exudates is crucial to the soil stability in the rhizospheres. However, scientists still debate (1) the key organic matter of the root exudates affecting the AES and (2) the interspecific vari...
UNLABELLED BACKGROUND Adverse events (AEs) frequently occur in intensive care units (ICUs) and affect negatively patient outcomes. Targeted improvement strategies for patient safety are difficult to evaluate because of the intrinsic limitations of reporting crude AE rates. Single interventions influence positively the quality of care, but a multifaceted approach has been tested only in selec...
Ad hoc networks have become more widespread and important because they support mobility can be used in different situations some difficult areas such as rescue missions, military, vehicular communications. Security is stated among the most significant challenges facing Hoc due to its characteristic features topology dynamicity, lack of infrastructure centralization, open architecture. work on b...
This memo describes the use of the Advanced Encryption Standard (AES) with 192and 256-bit keys within the Secure RTP (SRTP) protocol. It details counter mode encryption for SRTP and Secure Realtime Transport Control Protocol (SRTCP) and a new SRTP Key Derivation Function (KDF) for AES-192 and AES-256.
This paper provides four different architectures for encrypting and decrypting 128 bit information via the AES. The encryption algorithm includes the Key Expansion module which generates Key for all iterations on the fly, Double AEStwo-key triple AES, AESX and AES-EXE. These architectures are implemented and studied in Altera Cyclone III and STRATIX Family devices.
Following paper examines hardware implementation methods regarding Advanced Encryption Standard (AES). Compared to software implementation, migrating to hardware provides higher level of security and faster encryption speed. An overview of existing AES hardware implementation techniques are summarized. Then the direction of reconfigurable coprocessor as a cryptography hardware is proposed. Keyw...
The AES is still the ”State of the Art” cryptographic algorithm, and power analysis attacks had shown that breaking traditionally said high secure ciphers (like AES) is done with a relative low effort. This paper describes how to perform such an attack on an AES implementation.
In this note we study security of 128-bit key 10-round AES against the boomerang attack. We show attacks on AES reduced to 5 and 6 rounds, much faster than the exhaustive key search and twice faster than the “Square” attack of the AES designers. The attacks are structural and apply to other SPN ciphers with incomplete diffusion.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید