نتایج جستجو برای: most 3

تعداد نتایج: 2994586  

2005
Matthias Ernst Ellen Jochemsz Alexander May Benne de Weger

We present several attacks on RSA that factor the modulus in polynomial time under the condition that a fraction of the most significant bits or least significant bits of the private exponent is available to the attacker. Our new attacks on RSA are the first attacks of this type that work up to full size public or private exponent.

2006
GEOFF A. BOXSHALL

Phylogenetic relationships between the known genera of the order Misophrioida permit the identi® cation of two lineages: one consisting of the family Misophriidae Brady, 1878 which comprises seven genera, and a new, monotypic family, the Palpophriidae Boxshall & Jaume, 1999; the other consisting of another new family, the SpeleophriidaeBoxshall & Jaume, 1999, comprising eight genera. Habitat ex...

2016
Barak Shani

This paper gives the first bit security result for the elliptic curve Diffie–Hellman key exchange protocol for elliptic curves defined over prime fields. About 5/6 of the most significant bits of the x-coordinate of the Diffie–Hellman key are as hard to compute as the entire key. A similar result can be derived for the 5/6 lower bits. The paper also generalizes and improves the result for ellip...

Journal: :Cyberpsychology & behavior : the impact of the Internet, multimedia and virtual reality on behavior and society 2008
Wen-Bin Chiou

The negative impact of Internet use on adolescents has received much popular attention and has also become a popular research topic. How to induce adolescent players to change their attitudes toward online gaming is one of the most important issues in online gaming addiction. The present study is based on the less-leads-to-more effect of dissonance theory. Experimental research was conducted to...

Journal: :IEEE Trans. Circuits Syst. Video Techn. 2002
Vasily G. Moshnyaga

In this paper, we propose a new architectural technique to reduce energy dissipation of frame memory through adaptive bitwith compression. Unlike related approaches, the technique utilizes the fixed order of memory accesses and data correlation of video sequences by dynamically adjusting the memory bitwidth to the number of bits changed per pixel. Instead of treating data bits independently, we...

Journal: :J. Information Security 2012
Adel Hammad Abusitta

A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels. The new method proposed does not require that the watermark pattern to be embedded in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید