نتایج جستجو برای: استاندارد gost 10791

تعداد نتایج: 35658  

Journal: :Jurnal Polimesin 2023

The product quality of machining results is greatly influenced by the accuracy and precision CNC lathe machine tools. Regular inspection geometric inaccuracy tool necessary to verify its operational viability. This research contribution focuses on conducting experimental studies evaluate error. aim explore cost-effective measurement methods as alternatives direct measurements, which often invol...

Journal: :IACR Cryptology ePrint Archive 2007
Orhun Kara

In this paper we describe a novel attack method on product ciphers, the reflection attack. The attack method exploits certain similarities among round functions which have not been utilized in previous self similarity attacks. We give practical examples illustrating the power of the reflection attack on several ciphers such as GOST, DEAL and some variants of DES and Magenta. Many interesting an...

Journal: :IACR Cryptology ePrint Archive 2015
Riham AlTawy Onur Duman Amr M. Youssef

Kuznyechik is an SPN block cipher that has been chosen recently to be standardized by the Russian federation as a new GOST cipher. In this paper, we present two fault analysis attacks on two different settings of the cipher. The first attack is a differential fault attack which employs the random byte fault model, where the attacker is assumed to be able to fault a random byte in rounds seven a...

Journal: :The Proceedings of The Manufacturing & Machine Tool Conference 2019

Journal: :IACR Cryptology ePrint Archive 2015
Alex Biryukov Léo Perrin Aleksei Udovenko

The last hash function and block cipher standardized by the Russian standardization body (GOST) both use the same S-Box. It is also used by an independent CAESAR candidate. This transformation is only specified as a look up table and the reason behind its choice is unknown. We managed to reverse-engineer this S-Box and describe its unpublished structure. Our decomposition allows a much more eff...

1999
David Naccache Adi Shamir Julien P. Stern

This paper introduces a method for tracking different copies of functionally equivalent algorithms containing identification marks known to the attacker. Unlike all previous solutions, the new technique does not rely on any marking assumption and leads to a situation where each copy is either traceable or so severely damaged that it becomes impossible to store in polynomial space or run in poly...

Journal: :IACR Cryptology ePrint Archive 2016
Liliya R. Ahmetzyanova Evgeny Alekseev Igor B. Oshkin Stanislav V. Smyshlyaev Lolita A. Sonina

This paper presents a security bound in the standard security model for the Magma cipher CTR encryption mode and the «CryptoPro Key Meshing» ( CPKM ) re-keying method that was previously used with the GOST 28147-89 cipher. We enumerate the main requirements that should be followed during the development of re-keying methods, then we propose a modified method and justify its advantages over CPKM...

Journal: :Precision Engineering-journal of The International Societies for Precision Engineering and Nanotechnology 2022

In 2020, an S-shape part was proposed as a 5-axis reception test in the new version of ISO 10791–7:2020. This enables testing machine-tool behavior that involves high variation tool axis orientation. is formed fillet which machined flank milling with endmill Ø20 mm. Any defects are influenced by accuracy CAD model, CAM path computation, measurement uncertainty free-formed surface coordinate mac...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید