نتایج جستجو برای: aes also

تعداد نتایج: 2403555  

2000
Donald Byron Johnson

In a paper submitted previously, the author argued that a new AES evaluation criterion of future resiliency be added, defined as the ability to respond to the uncertain future and that this criterion could best be met by NIST selecting multiple disparate AES winners. This paper continues that discussion by providing more rationale. It also asks some questions and explores possible outcomes of t...

Journal: :Journal of child and adolescent psychopharmacology 2009
Shauna P Reinblatt Susan DosReis John T Walkup Mark A Riddle

OBJECTIVE The aim of this study was to examine the prevalence of activation cluster adverse events (AC-AEs) in youths treated with the selective serotonin reuptake inhibitor (SSRI) fluvoxamine for anxiety and the relationship of AC-AEs to SSRI blood levels. METHODS Data from the Research Units on Pediatric Psychopharmacology (RUPP) Anxiety Study were examined for 45 youths (22 active fluvoxam...

2003
Chien-Ning Chen Sung-Ming Yen

This paper describes a DFA attack on the AES key schedule. This fault model assumes that the attacker can induce a single byte fault on the round key. It efficiently finds the key of AES-128 with feasible computation and less than thirty pairs of correct and faulty ciphertexts. Several countermeasures are also proposed. This weakness can be resolved without modifying the structure of the AES al...

2009
Daniel E. O'leary

The purpose of this paper is to analyze the use of multiple criterion decision making (MCDM) in accounting expert systems (AES). Focusing on the MCDM nature of expert system evaluation functions leads towards a partial taxonomy of AES and a further understanding of "intelligence" in AES. The focus on the MCDM nature of the evaluation functions also serves to highlight the limitations of some of...

Journal: :Computers & Security 2013
Xinjie Zhao Shize Guo Fan Zhang Tao Wang Zhijie Jerry Shi Zhe Liu Jean-François Gallais

Existing trace driven cache attacks (TDCAs) can only analyze the cache events in the first two rounds or the last round of AES, which limits the efficiency of the attacks. Recently, Zhao et al. proposed the multiple deductions-based algebraic side-channel attack (MDASCA) to cope with the errors in leakage measurements and to exploit new leakage models. Their preliminary results showed that MDAS...

2011
Anja Schweizer Sylvie Dejager James E Foley Wolfgang Kothny

AIM Analyzing safety aspects of a drug from individual studies can lead to difficult-to-interpret results. The aim of this paper is therefore to assess the general safety and tolerability, including incidences of the most common adverse events (AEs), of vildagliptin based on a large pooled database of Phase II and III clinical trials. METHODS Safety data were pooled from 38 studies of ≥ 12 to...

Journal: :International journal for quality in health care : journal of the International Society for Quality in Health Care 2010
Mondher Letaief Sana El Mhamdi Riham El-Asady Sameen Siddiqi Ahmed Abdullatif

BACKGROUND Despite the worldwide growing attention to patient safety, Tunisia has no data on the magnitude and consequences of hospital adverse events (AEs). OBJECTIVE To estimate the incidence, nature and consequences of AEs and preventable AEs in a university hospital in Tunisia. DESIGN AND SETTING We opted for a two-stage retrospective medical record review of 620 inpatients admitted dur...

Journal: :IACR Trans. Symmetric Cryptol. 2016
Khoongming Khoo Eugene Lee Thomas Peyrin Siang Meng Sim

The related-key model is now considered an important scenario for block cipher security and many schemes were broken in this model, even AES-192 and AES-256. Recently were introduced e cient computer-based search tools that can produce the best possible relatedkey truncated di erential paths for AES. However, one has to trust the implementation of these tools and they do not provide any meaning...

2006
Kazuhiko Minematsu Yukiyasu Tsunoo

We propose message authentication codes (MACs) that combine a block cipher and an additional (keyed or unkeyed) permutation. Our MACs are provably secure if the block cipher is pseudorandom and the additional permutation has a small differential probability. We also demonstrate that our MACs are easily implemented with AES and its 4-round version to obtain MACs that are provably secure and 1.4 ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید