نتایج جستجو برای: msbs

تعداد نتایج: 93  

2007
Hung-Min Sun Mu-En Wu Yao-Hsin Chen

In the RSA system, balanced modulus N denotes a product of two large prime numbers p and q, where q < p < 2q. Since IntegerFactorization is difficult, p and q are simply estimated as √ N . In the Wiener attack, 2 √ N is adopted to be the estimation of p+ q in order to raise the security boundary of private-exponent d. This work proposes a novel approach, called EPF, to determine the appropriate...

2011
Shivendra Shivani Anoop Kumar Patel Sushila Kamble Suneeta Agarwal

ABSTRACT This paper proposes a block-wise fragile watermarking scheme based on k-medoids clustering approach. Proposed scheme is effective enough to reconstruct the tampered extensive content of an image. According to the suggested algorithm, first of all image is divided into the blocks and forty eight bits are calculated for each block, which consist of forty five Recovery bits and three Auth...

Journal: :IEICE Transactions 2007
Wei Chen Johan Bauwelinck Peter Ossieur Xing-Zhi Qiu Jan Vandewege

This paper describes a current-steering Digital-to-Analog Converter (IDAC) architecture with a novel switching scheme, designed for GPON Burst Mode Laser Drivers (BMLD) and realized in a 0.35 μm SiGe BiCMOS technology with 3.3 V power supply. The (4+6) segmented architecture of the proposed 10-bit IDAC is optimized for minimum DNL (Differential Nonlinearity). It combines a 4-bit MSBs (Most Sign...

2006
Ting-Yu Lin Hung-Min Sun

Young and Yung devised various backdoors for RSA key generation. However, due to their backdoor constructing method, the two MSBs of the modulus n generated by their systems have di¤erent distribution than that generated by the normal RSA. Thus, someone may observe the abnormal distribution of n to detect the existence of backdoors. Recently, Crepéau and Slakmon further suggested four simple wa...

Journal: :Egyptian dental journal 2021

Objective: This study aimed to investigate the microshear bond strength of adhesive resin cement Leucite-reinforced CAD/CAM ceramic and compare it with that prewarmed nanohybrid composite. Materials methods: Sixty Empress CAD plates were prepared. Each plate received five Tygon tube micro-cylinders filled bonding agents creating 5 resinous on each plate. In first group (GpA), they cement, compo...

2001
Zhan Yu Meng-Lin Yu Kamran Azadet Alan N. Willson

While arithmetic circuits using 2’s complement representation are easy to implement, it is well-known that the sign-extension bits of a 2’s complement number cause high switching activity in digital arithmetic circuits. Such switching is undesirable in low power applications. In this work, we exploit the sign-extension property of a 2’s complement number and propose a reduced representation of ...

Journal: :IACR Cryptology ePrint Archive 2010
Santanu Sarkar Subhamoy Maitra

In this paper we present some problems and their solutions exploiting lattice based root finding techniques. In CaLC 2001, Howgrave-Graham proposed a method to find the Greatest Common Divisor (GCD) of two large integers when one of the integers is exactly known and the other one is known approximately. In this paper, we present three applications of the technique. The first one is to show dete...

Journal: :Genetics and molecular research : GMR 2014
S Jafari A Hashemi

Estimation of genetic parameters is the most important component of an organized selection program. With respect to economic traits, such as wool and mutton traits, production costs can be reduced through a suitable selection program focused on genetic improvement. This study aimed to evaluate genetic parameters of fleece and post-weaning growth traits in sheep. Greasy fleece weight at 6, 16, 2...

2012
Jean-Charles Faugère Christopher Goyet Guénaël Renault

We describe a lattice attack on DSA-like signature schemes under the assumption that implicit information on the ephemeral keys is known. Inspired by the implicit oracle of May and Ritzenhofen presented in the context of RSA (PKC2009), we assume that the ephemeral keys share a certain amount of bits without knowing the value of the shared bits. This work also extends results of Leadbitter, Page...

A pedigree file consisting of 5860 individuals, 167 sires and 1582 dams collected at Makooei sheep breeding station (MSBS) during a period of 24 years (1990 to 2013) was used to calculate the inbreeding coefficients to reveal any probable effects of inbreeding (F) on the studied traits. The studied traits were classified to the five main groups including body weight, Kleiber ratio, body measure...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید