نتایج جستجو برای: استاندارد gost 10791
تعداد نتایج: 35658 فیلتر نتایج به سال:
The product quality of machining results is greatly influenced by the accuracy and precision CNC lathe machine tools. Regular inspection geometric inaccuracy tool necessary to verify its operational viability. This research contribution focuses on conducting experimental studies evaluate error. aim explore cost-effective measurement methods as alternatives direct measurements, which often invol...
In this paper we describe a novel attack method on product ciphers, the reflection attack. The attack method exploits certain similarities among round functions which have not been utilized in previous self similarity attacks. We give practical examples illustrating the power of the reflection attack on several ciphers such as GOST, DEAL and some variants of DES and Magenta. Many interesting an...
Kuznyechik is an SPN block cipher that has been chosen recently to be standardized by the Russian federation as a new GOST cipher. In this paper, we present two fault analysis attacks on two different settings of the cipher. The first attack is a differential fault attack which employs the random byte fault model, where the attacker is assumed to be able to fault a random byte in rounds seven a...
The last hash function and block cipher standardized by the Russian standardization body (GOST) both use the same S-Box. It is also used by an independent CAESAR candidate. This transformation is only specified as a look up table and the reason behind its choice is unknown. We managed to reverse-engineer this S-Box and describe its unpublished structure. Our decomposition allows a much more eff...
This paper introduces a method for tracking different copies of functionally equivalent algorithms containing identification marks known to the attacker. Unlike all previous solutions, the new technique does not rely on any marking assumption and leads to a situation where each copy is either traceable or so severely damaged that it becomes impossible to store in polynomial space or run in poly...
This paper presents a security bound in the standard security model for the Magma cipher CTR encryption mode and the «CryptoPro Key Meshing» ( CPKM ) re-keying method that was previously used with the GOST 28147-89 cipher. We enumerate the main requirements that should be followed during the development of re-keying methods, then we propose a modified method and justify its advantages over CPKM...
In 2020, an S-shape part was proposed as a 5-axis reception test in the new version of ISO 10791–7:2020. This enables testing machine-tool behavior that involves high variation tool axis orientation. is formed fillet which machined flank milling with endmill Ø20 mm. Any defects are influenced by accuracy CAD model, CAM path computation, measurement uncertainty free-formed surface coordinate mac...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید