نتایج جستجو برای: caesar competition

تعداد نتایج: 86460  

2017
Olga Poppe Chuan Lei Elke A. Rundensteiner Daniel J. Dougherty Goutham Deva Nicholas Fajardo James Owens Thomas Schweich MaryAnn Van Valkenburg Sarun Paisarnsrisomsuk Pitchaya Wiratchotisatian George Gettel Robert Hollinger Devin Roberts Daniel Tocco

We demonstrate the first full-fledged context-aware event processing solution, called CAESAR, that supports application contexts as first class citizens. CAESAR offers humanreadable specification of context-aware application semantics composed of context derivation and context processing. Both classes of queries are only relevant during their respective contexts. They are suspended otherwise to...

Journal: :CoRR 2015
Atish Jain Ronak Dedhia Abhijit Patil

Caesar cipher is an ancient, elementary method of encrypting plain text message into cipher text protecting it from adversaries. However, with the advent of powerful computers, there is a need for increasing the complexity of such techniques. This paper contributes in the area of classical cryptography by providing a modified and expanded version for Caesar cipher using knowledge of mathematics...

Journal: :International Bulletin of Mission Research 2020

2015
Mary Regina Boland Nicholas P. Tatonetti George Hripcsak

BACKGROUND Electronic Health Records (EHRs) contain a wealth of information useful for studying clinical phenotype-genotype relationships. Severity is important for distinguishing among phenotypes; however other severity indices classify patient-level severity (e.g., mild vs. acute dermatitis) rather than phenotype-level severity (e.g., acne vs. myocardial infarction). Phenotype-level severity ...

Journal: :The General: Brock University Undergraduate Journal of History 2020

Journal: :Revista de la Facultad de Derecho de México 2017

2014
Elena Andreeva Begül Bilgin Andrey Bogdanov Atul Luykx Florian Mendel Bart Mennink Nicky Mouha Qingju Wang Kan Yasuda

Journal: :Review & Expositor 1909

Journal: :IACR Cryptology ePrint Archive 2017
Alex Biryukov Aleksei Udovenko Vesselin Velichkov

NORX is one of the fifteen authenticated encryption algorithms that have reached the third round of the CAESAR competition. NORX is built using the sponge-based Monkey Duplex construction. In this note we analyze the core permutation F . We show that it has rotational symmetries on different structure levels. This yields simple distinguishing properties for the permutation, which propagate with...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید