نتایج جستجو برای: space is known unfortunately

تعداد نتایج: 7481561  

Journal: :IACR Cryptology ePrint Archive 2012
Stanislav Bulygin Michael Walter

In this paper we investigate the invariant property of PRINTcipher first discovered by Leander et al. in their CRYPTO 2011 paper. We provide a thorough study and show that there exist 64 families of weak keys for PRINTcipher–48 and many more for PRINTcipher–96. Moreover, we show that searching the weak key space may be substantially sped up by splitting the search into two consecutive steps. We...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده مهندسی 1389

abstract type-ii fuzzy logic has shown its superiority over traditional fuzzy logic when dealing with uncertainty. type-ii fuzzy logic controllers are however newer and more promising approaches that have been recently applied to various fields due to their significant contribution especially when the noise (as an important instance of uncertainty) emerges. during the design of type- i fuz...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز 1381

‏‎the community dynamics of aquatic coleoptera(insecta)in one of the spring-stream habitats of bammo national park in fars province called cheshmeh-ye-ghanbari is studied as a pilot project and model for acquaintance with and furthering the biodiversity studies on fauna of iran. sixteen species-populations out of nineteen of this community were already identified for their taxonomy and for thei...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده شیمی 1389

in this project, some new polyaspartimides, (pas)s, have been synthesized form michael addition reaction between new synthetic bismaleimide (bmi) and some aromatic diamines. a characteristic property of this polyaspartimides is a pendent carboxylic group, which introduced to these polymers from new bismaleimide. bismaleimides (bmi) is one of the interesting compounds, which can be self-polymeri...

Journal: :Knee Surgery, Sports Traumatology, Arthroscopy 2013

Journal: :CoRR 2005
Shujun Li Guanrong Chen Albert Cheung Kwok-Tung Lo

This paper studies the security of a recentlyproposed MPEG-video encryption scheme based on secret Huffman tables. Our cryptanalysis shows that: 1) the key space of the encryption scheme is not sufficiently large against divide-and-conquer (DAC) attack and known-plaintext attack; 2) it is possible to decrypt a cipher-video with a partiallyknown key, thus dramatically reducing the complexity of ...

1985
Burton S. Kaliski Ronald L. Rivest Alan T. Sherman

The Data Encryption Standard (DES) defines an indexed set of permutations acting on the message space M = (0,l)". If this set of permutations were closed under functional composition, then DES would be vulnerable to a known-plaintext attack that runs in 228 steps, on the average. It is unknown in the open literature whether or not DES has this weakness. We describe two statistical tests for det...

2009
Shujun Li Guanrong Chen Albert Cheung Kwok-Tung Lo Mohan S. Kankanhalli

This paper studies the security of a recentlyproposed MPEG-video encryption scheme based on secret Huffman tables. Our cryptanalysis shows that: 1) the key space of the encryption scheme is not sufficiently large against divide-and-conquer (DAC) attack and known-plaintext attack; 2) it is possible to decrypt a cipher-video with a partiallyknown key, thus dramatically reducing the complexity of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید