نتایج جستجو برای: رمزنگار aes

تعداد نتایج: 8783  

2016
Priya Deshmukh

Abstract— These In today’s world data security is the major problem which is to be face. In order to secure data during communication, data storage and transmission we use Advance encryption standard(AES). AES is a symmetric block cipher intended to replace DES for commercial applications.it uses 128-bit block size and a key size of 128, 192, or 256 bits. The AES algorithmis use to secure data ...

Journal: :Stem cells 2010
Qingguo Zhao Jianle Wang Yu Zhang Zhaohui Kou Sheng Liu Shaorong Gao

Androgenetic embryonic stem (aES) cells, produced by pronuclear transplantation, offer an important autologous pluripotent stem cell source. However, the isolation of aES cells, particularly individual-specific aES cells, with the use of fertilized embryos has limited the practical applications of this technology in humans. In this study, we applied a new approach, essentially described as soma...

Journal: :The International journal of risk & safety in medicine 1995
A F Tempelaar

IN MEDICINE The Harvard Medical Practice Study in the State of New York (1990) pointed out that 3.7% of a sample of 30195 hospitalized patients suffered an adverse event (AE) resulting in measurable disability. Physician experts reviewed 1133 AEs defined as unintended injuries caused by medical management. The AEs were classified as preventable, unpreventable and potentially preventable (i.e. c...

Journal: :iranian journal of public health 0
c tereanu dg minca r costea d janta s grego l ravera

background: patient safety within healthcare systems is a central aspect of health policy in most developed countries. from april 2007 to may 2009, the pilot project expir-ro tested a voluntary incident reporting system in a public hospital in bucharest romania, in collaboration with two italian hospitals (in genoa and milan). methods: data were collected anonymously through a form based on the...

Journal: :Seizure 2013
Gaetano Zaccara Fabio Giovannelli Dario Maratea Valeria Fadda Alberto Verrotti

PURPOSE Analysis of overall tolerability and neurological adverse effects (AEs) of eslicarbazepine acetate (ESL), lacosamide (LCM) and oxcarbazepine (OXC) from double-blind, placebo-controlled trials. Indirect comparisons of patients withdrawing because of AEs, and the incidence of some vestibulocerebellar AEs between these three antiepileptic dugs (AEDs). METHODS We searched MEDLINE for all ...

Journal: :Journal of Alzheimer's disease : JAD 2015
Brendan J Guercio Nancy J Donovan Catherine E Munro Sarah L Aghjayan Sarah E Wigman Joseph J Locascio Rebecca E Amariglio Dorene M Rentz Keith A Johnson Reisa A Sperling Gad A Marshall

BACKGROUND Apathy is a common neuropsychiatric symptom in Alzheimer's disease (AD) dementia and mild cognitive impairment (MCI). Detecting apathy accurately may facilitate earlier diagnosis of AD. The Apathy Evaluation Scale (AES) is a promising tool for measurement of apathy in prodromal and possibly preclinical AD. OBJECTIVE To compare the three AES sub-scales - subject-reported (AES-S), in...

2009
Shay Gueron

The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore broadly accepted as the standard for both government and industry applications. If fact, almost any new protocol requiring symmetric encryption supports AES, and many existing systems that were originally designed with...

2005
Daniel J. Bernstein

This paper demonstrates complete AES key recovery from known-plaintext timings of a network server on another computer. This attack should be blamed on the AES design, not on the particular AES library used by the server; it is extremely difficult to write constant-time high-speed AES software for common general-purpose computers. This paper discusses several of the obstacles in detail.

2004
Jean Monnerat Serge Vaudenay

In 2002, Murphy and Robshaw introduced an extension BES of AES and argued this could compromise the security of AES. We introduce here two block-ciphers CES and Big-BES that are some extensions of the AES and BES respectively in the spirit of Hensel lifting extensions. They are defined similarly to the AES respectively BES except that every operations are performed in a ring structure including...

2012
Patrick Derbez Pierre-Alain Fouque Jérémy Jean

In this paper, we revisit meet-in-the-middle attacks on AES in the single-key model and improve on Dunkelman, Keller and Shamir attacks of Asiacrypt 2010. We present the best attack on 7 rounds of AES-128 where data/time/memory complexities are below 2. Moreover, we are able to extend the number of rounds to reach attacks on 8 rounds for both AES-192 and AES-256. This gives the best attacks on ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید