نتایج جستجو برای: mansour e

تعداد نتایج: 1017306  

Journal: :Lecture Notes in Computer Science 2022

The Even-Mansour cipher is a simple method for constructing (keyed) pseudorandom permutation E from public random $$P:\{0,1\}^n \rightarrow \{0,1\}^n$$ . It secure against classical attacks, with optimal attacks requiring $$q_E$$ queries to and $$q_P$$ P such that $$q_E \cdot q_P \approx 2^n$$ If the attacker given quantum access both P, however, completely insecure, using $$q_E, = O(n)$$ known...

Journal: :Des. Codes Cryptography 2018
Jooyoung Lee Atul Luykx Bart Mennink Kazuhiko Minematsu

The significance of understanding blockcipher security in the multi-key setting is highlighted by the extensive literature on attacks, and how effective key size can be significantly reduced. Nevertheless, little attention has been paid in formally understanding the design of multi-key secure blockciphers. In this work, we formalize the multi-key security of tweakable blockciphers in case of ge...

Journal: :Computer methods in biomechanics and biomedical engineering 2015
K Lepetit C Hansen K Ben Mansour F Marin

3D location deduced by inertial measurement units: a challenging problem K. Lepetit, C. Hansen, K. Ben Mansour & F. Marin To cite this article: K. Lepetit, C. Hansen, K. Ben Mansour & F. Marin (2015) 3D location deduced by inertial measurement units: a challenging problem, Computer Methods in Biomechanics and Biomedical Engineering, 18:sup1, 1984-1985, DOI: 10.1080/10255842.2015.1070589 To link...

Journal: :IACR Cryptology ePrint Archive 2014
Shoni Gilboa Shay Gueron

The r-rounds Even–Mansour block cipher is a generalization of the well known Even–Mansour block cipher to r iterations. Attacks on this construction were described by Nikolić et al. and Dinur et al. for r = 2, 3. These attacks are only marginally better than brute force but are based on an interesting observation (due to Nikolić et al.): for a “typical” permutation P, the distribution of P(x)⊕ ...

Journal: :IACR Cryptology ePrint Archive 2015
Nicky Mouha Atul Luykx

At ASIACRYPT 1991, Even and Mansour introduced a block cipher construction based on a single permutation. Their construction has since been lauded for its simplicity, yet also criticized for not providing the same security as other block ciphers against generic attacks. In this paper, we prove that if a small number of plaintexts are encrypted under multiple independent keys, the Even-Mansour c...

Journal: :CMES: Centre of Middle Eastern Studies 2023

This research concentrates on the analysis of wisdom quotes compilation within Qālū anthology by Anis Mansour. Among other studies Mansour, examining this is significant due to its previously unexplored nature, specifically regarding Mansour's attitude toward women as represented in work. Utilizing a qualitative descriptive method and bibliographic technique, study describes data related women'...

Journal: :IACR Cryptology ePrint Archive 2015
Benoit Cogliati Rodolphe Lampe Yannick Seurin

We study how to construct efficient tweakable block ciphers in the Random Permutation model, where all parties have access to public random permutation oracles. We propose a construction that combines, more efficiently than by mere black-box composition, the CLRW construction (which turns a traditional block cipher into a tweakable block cipher) of Landecker et al. (CRYPTO 2012) and the iterate...

Journal: :Physiology & behavior 1981
A Mansour R Doyle R Katz E S Valenstein

MANSOUR, A., R. DOYLE, R. KATZ AND E. S. VALENSTEIN. Long-lasting changes in morphine sensitivity following amygdaloid kindling in mice. PHYSIOL. BEHAV. 27(6) 1117-1120, 1981.--Mice tested at either 3, 27 or 90 days following their last amygdala kindled convulsion exhibited a marked increase in response to morphine compared to controls. Kindled animals showed a higher incidence of clonic convul...

2004
Chein-Wei Jen

K. Premaratne, E. I. Jury, and M. Mansour, “An algorithm for model reduction of 2-D discrete time systems,” IEEE Trans. Circuits Syst. , vol. 37, pp. 1116-1132, Sept. 1990. M. Kawamata, T. Lin, and T. Higuchi, “Minimization of sensitivity of 2-D state-space digital filters and its realization to 2-D balanced realizations,” in Proc. IEEE I987 Int. Symp. Circuits and Syst. vol. 2, pp. 710-713, Ph...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید