نتایج جستجو برای: 128

تعداد نتایج: 21232  

2008
Hongjun Wu

Statement 1. HC-128 supports 128-bit key and 128-bit initialization vector. Statement 2. 2 keystream bits can be generated from each key/IV pair. Statement 3. There is no hidden flaw in HC-128. Statement 4. The smallest period is expected to be much larger than 2. Statement 5. Recovering the secret key is as difficult as exhaustive key search. Statement 6. Distinguishing attack requires more th...

2016
Klas Sandell

Th e conceptual framework of ecostrategies (views and use of landscape) presented here have been used to analyse various cases of nature-based tourism and related activities such as outdoor recreation, outdoor education, nature reserves and conservation. Th e role of the ecostrategies is to illustrate the intersections, confl icts and alliances between diff erent types of nature based tourism a...

Journal: :CoRR 2006
María Naya-Plasencia

This paper presents two attacks against Achterbahn-128/80, the last version of one of the stream cipher proposals in the eSTREAM project. The attack against the 80-bit variant, Achterbahn-80, has complexity 2^{56.32}. The attack against Achterbahn-128 requires 2^{75.4} operations and 2^{61} keystream bits. These attacks are based on an improvement of the attack due to Hell and Johansson against...

Journal: :Des. Codes Cryptography 2012
Paul Stankovski Sushmita Ruj Martin Hell Thomas Johansson

HC-128 is an eSTREAM final portfolio stream cipher. Several authors have investigated its security and, in particular, distinguishing attacks have been considered. Still, no one has been able to provide a distinguisher stronger than the one presented by Wu in the original HC128 paper. In this paper we first argue that the keystream requirement in Wu’s original attack is underestimated by a fact...

2007
María Naya-Plasencia

This paper presents two key-recovery attacks against Achterbahn-128/80, the last version of one of the stream cipher proposals in the eSTREAM project. The attack against the 80-bit variant, Achterbahn80, has complexity 2. The attack against Achterbahn-128 requires 2 operations and 2 keystream bits. These attacks are based on an improvement of the attack due to Hell and Johansson against Achterb...

Journal: :Journal of Software 2008

Journal: :IET Information Security 2007

Journal: :Journal of Cryptology 2015

Journal: :Prehospital and Disaster Medicine 2023

Introduction: Existing studies have identified the national rate of PVT for severely injured patients to be 9-16%, our ED has displayed a incidence 35.4%, suggesting substantial difference in arrival. This study aims explore descriptive demographics and injury characteristics who arrived by ED. Method: A prospective, single-center observational conducted Detroit, Michigan. Included aged 15 ≥ ye...

2002
Lars R. Knudsen

Earlier it has been reported that there exist correlation attacks on RC6 with 128-bit blocks with a reduced number of rounds. In this note it is investigated how well RC6 with 256-bit blocks resists such attacks.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید