نتایج جستجو برای: space is known unfortunately
تعداد نتایج: 7481561 فیلتر نتایج به سال:
In this paper we investigate the invariant property of PRINTcipher first discovered by Leander et al. in their CRYPTO 2011 paper. We provide a thorough study and show that there exist 64 families of weak keys for PRINTcipher–48 and many more for PRINTcipher–96. Moreover, we show that searching the weak key space may be substantially sped up by splitting the search into two consecutive steps. We...
abstract type-ii fuzzy logic has shown its superiority over traditional fuzzy logic when dealing with uncertainty. type-ii fuzzy logic controllers are however newer and more promising approaches that have been recently applied to various fields due to their significant contribution especially when the noise (as an important instance of uncertainty) emerges. during the design of type- i fuz...
the community dynamics of aquatic coleoptera(insecta)in one of the spring-stream habitats of bammo national park in fars province called cheshmeh-ye-ghanbari is studied as a pilot project and model for acquaintance with and furthering the biodiversity studies on fauna of iran. sixteen species-populations out of nineteen of this community were already identified for their taxonomy and for thei...
in this project, some new polyaspartimides, (pas)s, have been synthesized form michael addition reaction between new synthetic bismaleimide (bmi) and some aromatic diamines. a characteristic property of this polyaspartimides is a pendent carboxylic group, which introduced to these polymers from new bismaleimide. bismaleimides (bmi) is one of the interesting compounds, which can be self-polymeri...
This paper studies the security of a recentlyproposed MPEG-video encryption scheme based on secret Huffman tables. Our cryptanalysis shows that: 1) the key space of the encryption scheme is not sufficiently large against divide-and-conquer (DAC) attack and known-plaintext attack; 2) it is possible to decrypt a cipher-video with a partiallyknown key, thus dramatically reducing the complexity of ...
The Data Encryption Standard (DES) defines an indexed set of permutations acting on the message space M = (0,l)". If this set of permutations were closed under functional composition, then DES would be vulnerable to a known-plaintext attack that runs in 228 steps, on the average. It is unknown in the open literature whether or not DES has this weakness. We describe two statistical tests for det...
This paper studies the security of a recentlyproposed MPEG-video encryption scheme based on secret Huffman tables. Our cryptanalysis shows that: 1) the key space of the encryption scheme is not sufficiently large against divide-and-conquer (DAC) attack and known-plaintext attack; 2) it is possible to decrypt a cipher-video with a partiallyknown key, thus dramatically reducing the complexity of ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید