نتایج جستجو برای: sobhi mansour

تعداد نتایج: 522  

2016
Zhiyuan Guo Wenling Wu Renzhang Liu Liting Zhang

The tweakable Even-Mansour construction generalizes the conventional Even-Mansour scheme through replacing round keys by strings derived from a master key and a tweak. Besides providing plenty of inherent variability, such a design builds a tweakable block cipher from some lower level primitive. In the present paper, we evaluate the multi-key security of TEM-1, one of the most commonly used one...

2010
Jamal K. Mansour Heather D. Flowe

Jamal K. Mansour & Heather D. Flowe For more than a century psychologists have utilized eye tracking as a window into how we think and how we feel, and to test theories of the mind and its mental processes. A range of forensic topics has been investigated with eye tracking, such as the effect of weapon exposure (e.g., Hope & Wright, 2008), visual attention in anti-social personality disorder (e...

2001
A. MANSOUR C. G. PUNTONET N. OHNISHI

the Dept. of Microelectronics and Computer Engineering, UTM, Malaysia and Signal Processing Research Center, QUT, Australia A Simple ICA Algorithm Based On Geometrical Approach. A. MANSOUR 1, C. G. PUNTONET 2 and N. OHNISHI 1;3 1BMC RIKEN, Anagahora, Shimoshidami, Moriyama-ku, Nagoya 463-0003 (JAPAN) 2Dept. of Architecture and Computer Technology.University of Granada. Granada 18071 (SPAIN) 3De...

Journal: :Journal of Family Planning and Reproductive Health Care 2013

Journal: :IACR Transactions on Symmetric Cryptology 2017

Journal: :Designs, Codes and Cryptography 2021

Abstract Symmetric cryptographic primitives are often exposed to invariances: deterministic relations between plaintexts and ciphertexts that propagate through the primitive. Recent invariant subspace attacks have shown these can be a serious issue. One way mitigate is at primitive level, namely by proper use of round constants (Beierle et al., CRYPTO 2017). In this work, we investigate how thw...

2015
Chrysanthi Mavromati

Chaskey is a Message Authentication Code (MAC) for 32bit microcontrollers proposed by Mouha et. al at SAC 2014. Its underlying blockcipher uses an Even-Mansour construction with a permutation based on the ARX methodology. In this paper, we present key-recovery attacks against Chaskey in the single and multi-user setting. These attacks are based on recent work by Fouque, Joux and Mavromati prese...

Journal: :journal of applied pharmaceutical science 2022

The effect of the emerging omicron variant on willingness to take or continue with COVID-19 vaccination in Middle EastTareq L. Mukattash, Anan S. Jarab, Rana K. Abu-Farha, Rania Itani, Samar Karout, Razan Z. Mansour, Shorouq Abuhishmah

Journal: :European Journal of Combinatorics 2008

Journal: :The European journal of contraception & reproductive health care : the official journal of the European Society of Contraception 2013
Johannes Bitzer Jean-Jacques Amy Rob Beerthuizen Martin Birkhäuser Teresa Bombas Mitchell Creinin Philip D Darney Lisa Ferreira Vicente Kristina Gemzell-Danielsson Bruno Imthurn Jeffrey T Jensen Andrew M Kaunitz Ali Kubba Medard M Lech Diana Mansour Gabriele Merki Thomas Rabe Katarina Sedlecki David Serfaty Jacques Seydoux Lee P Shulman Regine Sitruk-Ware Sven O Skouby Anne Szarewski James Trussell Carolyn Westhoff

Cosignatories Jean-Jacques Amy, Rob Beerthuizen, Martin Birkhäuser, Teresa Bombas, Mitchell Creinin, Philip D Darney, Lisa Ferreira Vicente, Kristina Gemzell-Danielsson, Bruno Imthurn, Jeffrey T Jensen, Andrew M Kaunitz, Ali Kubba, Medard M Lech, Diana Mansour, Gabriele Merki, Thomas Rabe, Katarina Sedlecki, David Serfaty, Jacques Seydoux, Lee P Shulman, Regine Sitruk-Ware, Sven O Skouby, Anne ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید