نتایج جستجو برای: aes also
تعداد نتایج: 2403555 فیلتر نتایج به سال:
In a paper submitted previously, the author argued that a new AES evaluation criterion of future resiliency be added, defined as the ability to respond to the uncertain future and that this criterion could best be met by NIST selecting multiple disparate AES winners. This paper continues that discussion by providing more rationale. It also asks some questions and explores possible outcomes of t...
OBJECTIVE The aim of this study was to examine the prevalence of activation cluster adverse events (AC-AEs) in youths treated with the selective serotonin reuptake inhibitor (SSRI) fluvoxamine for anxiety and the relationship of AC-AEs to SSRI blood levels. METHODS Data from the Research Units on Pediatric Psychopharmacology (RUPP) Anxiety Study were examined for 45 youths (22 active fluvoxam...
This paper describes a DFA attack on the AES key schedule. This fault model assumes that the attacker can induce a single byte fault on the round key. It efficiently finds the key of AES-128 with feasible computation and less than thirty pairs of correct and faulty ciphertexts. Several countermeasures are also proposed. This weakness can be resolved without modifying the structure of the AES al...
The purpose of this paper is to analyze the use of multiple criterion decision making (MCDM) in accounting expert systems (AES). Focusing on the MCDM nature of expert system evaluation functions leads towards a partial taxonomy of AES and a further understanding of "intelligence" in AES. The focus on the MCDM nature of the evaluation functions also serves to highlight the limitations of some of...
Existing trace driven cache attacks (TDCAs) can only analyze the cache events in the first two rounds or the last round of AES, which limits the efficiency of the attacks. Recently, Zhao et al. proposed the multiple deductions-based algebraic side-channel attack (MDASCA) to cope with the errors in leakage measurements and to exploit new leakage models. Their preliminary results showed that MDAS...
AIM Analyzing safety aspects of a drug from individual studies can lead to difficult-to-interpret results. The aim of this paper is therefore to assess the general safety and tolerability, including incidences of the most common adverse events (AEs), of vildagliptin based on a large pooled database of Phase II and III clinical trials. METHODS Safety data were pooled from 38 studies of ≥ 12 to...
BACKGROUND Despite the worldwide growing attention to patient safety, Tunisia has no data on the magnitude and consequences of hospital adverse events (AEs). OBJECTIVE To estimate the incidence, nature and consequences of AEs and preventable AEs in a university hospital in Tunisia. DESIGN AND SETTING We opted for a two-stage retrospective medical record review of 620 inpatients admitted dur...
The related-key model is now considered an important scenario for block cipher security and many schemes were broken in this model, even AES-192 and AES-256. Recently were introduced e cient computer-based search tools that can produce the best possible relatedkey truncated di erential paths for AES. However, one has to trust the implementation of these tools and they do not provide any meaning...
We propose message authentication codes (MACs) that combine a block cipher and an additional (keyed or unkeyed) permutation. Our MACs are provably secure if the block cipher is pseudorandom and the additional permutation has a small differential probability. We also demonstrate that our MACs are easily implemented with AES and its 4-round version to obtain MACs that are provably secure and 1.4 ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید