نتایج جستجو برای: الگوریتم aes

تعداد نتایج: 31104  

2016
Fumihiko Kakizaki Masahiro Sonoshita Hiroyuki Miyoshi Yoshiro Itatani Shinji Ito Kenji Kawada Yoshiharu Sakai M. Mark Taketo

We recently found that the product of the AES gene functions as a metastasis suppressor of colorectal cancer (CRC) in both humans and mice. Expression of amino-terminal enhancer of split (AES) protein is significantly decreased in liver metastatic lesions compared with primary colon tumors. To investigate its downregulation mechanism in metastases, we searched for transcriptional regulators of ...

2010
Alex Biryukov Orr Dunkelman Nathan Keller Dmitry Khovratovich Adi Shamir

AES is the best known and most widely used block cipher. Its three versions (AES-128, AES-192, and AES-256) differ in their key sizes (128 bits, 192 bits and 256 bits) and in their number of rounds (10, 12, and 14, respectively). While for AES-128, there are no known attacks faster than exhaustive search, AES-192 and AES-256 were recently shown to be breakable by attacks which require 2 and 2 t...

2016
Jiangan Xie Christopher Codd Kevin Mo Yongqun He

M. bovis strain Bacillus Calmette-Guérin (BCG) has been the only licensed live attenuated vaccine against tuberculosis (TB) for nearly one century and has also been approved as a therapeutic vaccine for bladder cancer treatment since 1990. During its long time usage, different adverse events (AEs) have been reported. However, the AEs associated with the BCG preventive TB vaccine and therapeutic...

2013
Manish Kakkar Elizabeth T. Rogawski Syed Shahid Abbas Sanjay Chaturvedi Tapan N. Dhole Shaikh Shah Hossain Sampath K. Krishnan

In India, quality surveillance for acute encephalitis syndrome (AES), including laboratory testing, is necessary for understanding the epidemiology and etiology of AES, planning interventions, and developing policy. We reviewed AES surveillance data for January 2011-June 2012 from Kushinagar District, Uttar Pradesh, India. Data were cleaned, incidence was determined, and demographic characteris...

2013
Donghoon Chang Mohona Ghosh Somitra Sanadhya

Abstract. Biclique cryptanalysis was proposed by Bogdanov et al. in Asiacrypt 2011 as a new tool for cryptanalysis of block ciphers. A major hurdle in carrying out biclique cryptanalysis is that it has a very high query complexity (of the order of 2 for AES-128, 2 for AES-192 and 2 for AES-256). This naturally puts a big question mark over the practical feasibility of implementing biclique atta...

2013
Eman Mohammed Mahmoud Ahmed Abd El Hafez Talaat A. Elgarf

Advanced Encryption Standard (AES) block cipher system is widely used in cryptographic applications. The main core of AES block cipher is the substitution table or SBox. This S-box is used to provide confusion capability for AES. The aim of this paper is to design dynamic S-box which depends on the secret key. The parameters of the new created SBOXes have characteristics equal to those in the o...

2016
Hans Rutberg Madeleine Borgstedt-Risberg Pelle Gustafson Maria Unbeck

BACKGROUND The national incidence of adverse events (AEs) in Swedish orthopedic care has never been described. A new national database has made it possible to describe incidence, nature, preventability and consequences of AEs in Swedish orthopedic care. METHODS We used national data from a structured two-stage record review with a Swedish modification of the Global Trigger Tool. The sample wa...

Journal: :Quality & safety in health care 2010
M Smits M Zegers P P Groenewegen D R M Timmermans L Zwaan G van der Wal C Wagner

OBJECTIVES To examine the causes of adverse events (AEs) and potential prevention strategies to minimise the occurrence of AEs in hospitalised patients. METHODS For the 744 AEs identified in the patient record review study in 21 Dutch hospitals, trained reviewers were asked to select all causal factors that contributed to the AE. The results were analysed together with data on preventability ...

Journal: :IACR Cryptology ePrint Archive 2017
Wei Cheng Chao Zheng Yuchen Cao Yongbin Zhou Hailong Zhang Sylvain Guilley Laurent Sauvage

Rotating Sbox Masking (RSM) scheme is a lightweight and highly efficient first-order masking scheme proposed to protect cryptographic implementations like AES from side channel attacks. It is a Low Entropy Masking Scheme (LEMS) and has attracted special attention from academia and industry with its low overhead and high performance. The two public targets of DPA Contest v4 are both RSM-masked A...

2014
Henri Gilbert

We show that the so-called super S-box representation of AES – that provides a simplified view of two consecutive AES rounds – can be further simplified. In the untwisted representation of AES presented here, two consecutive AES rounds are viewed as the composition of a non-linear transformation S and an affine transformation R that respectively operate on the four 32-bit columns and on the fou...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید