نتایج جستجو برای: aes
تعداد نتایج: 8770 فیلتر نتایج به سال:
NICOLLE H. van SCHIJNDEL, AES Member, JULIEN BENSA, MADS G. CHRISTENSEN, CATHERINE COLOMES, BERND EDLER, AES Member, RICHARD HEUSDENS, JESPER JENSEN, SØREN HOLDT JENSEN, W. BASTIAAN KLEIJN, VALERY KOT, BALÁZS KÖVESI, JONAS LINDBLOM, DOMINIQUE MASSALOUX, OMAR A. NIAMUT, AES Associate Member, FREDRIK NORDÉN, JAN H. PLASBERG, RENAT VAFIN, STEVEN VAN DE PAR, AES Member, DAVID VIRETTE, AND OLIVER WÜ...
Cryptographic algorithm can be used to transfer the encrypted data securely on the network. AES encryption algorithm is used in many cryptographic applications. For this, various cryptographic algorithms are used for the security of different types of data like audio or video data transfer on the network. Advanced Encryption Standard (AES) is a NIST (National Institute of Standards and Technolo...
OBJECTIVE Radiation is an integral part of the treatment of many pelvic tumors. The cellular death induced by radiotherapy (RT) benefits cancer control but can also result in adverse effects (AEs) on the organ being treated or those adjacent to it. RT for cancers of the pelvis (bladder, prostate, rectum, uterus or cervix) can result in AEs in the urinary tract. While the acute urinary AEs of pe...
In recent years, the problem of interpersonal relationships has been reported to be associated with various adolescent psychiatric problems. Egocentrism is one factor related to the problem of interpersonal relationships. The Adolescent Egocentrism-Sociocentrism (AES) scale is used to assess egocentrism in Western countries, but no such scale has been developed in Japan. The purpose of our curr...
This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text...
PURPOSE Despite the widespread use of antiepileptic drugs (AEDs) across different neurologic and psychiatric disorders, no study has systematically reviewed all available randomized controlled trials (RCTs) of a given AED to fully uncover its tolerability profile. We aimed at identifying treatment emergent adverse events (AEs) associated with pregabalin through a systematic review and meta-anal...
Objective To assess the safety of azathioprine (AZA) in Japanese patients with antineutrophil cytoplasmic antibody-associated vasculitis (AAV). Methods We retrospectively enrolled 67 consecutive AAV patients who had initiated AZA treatment from January 2006 to August 2014 at Okayama University Hospital. We evaluated the development of severe adverse events (AEs), AZA discontinuation due to tota...
Differential Power Analysis (DPA) is a powerful and practical technique used to attack a cryptographic implementation in a resourcelimited application environment. Despite the extensive research on DPA of AES, it seems none has explicitly addressed the fundamental issue: How far should we protect the first and last parts of AES in order to resist practical DPA attacks, namely first and second-o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید