نتایج جستجو برای: cbc
تعداد نتایج: 2584 فیلتر نتایج به سال:
Recently Bernstein [4] has provided a simpler proof of indistinguishability of CBC construction [3] which is giving insight of the construction. Indistinguishability of any function intuitively means that the function behaves very closely to a uniform random function. In this paper we make a unifying and simple approach to prove indistinguishability of many existing constructions. We first revi...
We present a new way to construct a MAC function based on a block cipher. We apply this construction to AES resulting in a MAC function that is a factor 2.5 more efficient than CBC-MAC with AES, while providing a comparable claimed security level.
Conjoint Behavioral Consultation (CBC) is discussed as an emerging and effective model of home-school collaboration and shared problem solving. A case study is presented to demonstrate how practitioners can use CBC to deliver high quality consultation and intervention services to students, teachers, and parents in a real world setting. An evidence-based intervention (EBI) was implemented in the...
The security of interchanged use of modes of operation of block ciphers have not been discussed in the public literature. So far, the modes of operation of block ciphers have been treated as completely independent and uncorrelated. In this paper we represent both CBC and OFB as quasigroup string transformations, and then show that OFB mode is a special case of the CBC mode of operation. That ra...
The CCAAT box is a frequent element of eukaryotic promoters, and its specific recognition by the conserved heterotrimeric CCAAT-binding complex (CBC) constitutes a key step in promoter organization and regulation of transcription. Here, we report the crystal structures of the CBC from Aspergillus nidulans in the absence and in complex with double-stranded DNA at 1.8 Å resolution. The histone-li...
We present an improved bound on the advantage of any q-query adversary at distinguishing between the CBC MAC over a random n-bit permutation and a random function outputting n bits. The result assumes that no message queried is a prefix of any other, as is the case when all messages to be MACed have the same length. We go on to give an improved analysis of the encrypted CBC MAC, where there is ...
We examine the IND-qCPA security of the wide-spread block cipher modes of operation CBC, CFB, OFB, CTR, and XTS (i.e., security against quantum adversaries doing queries in superposition). We show that OFB and CTR are secure assuming that the underlying block cipher is a standard secure PRF (a pseudorandom function secure under classical queries). We give counterexamples that show that CBC, CFB...
W develop and test an incentive-compatible Conjoint Poker (CP) game. The preference data collected in the context of this game are comparable to incentive-compatible choice-based conjoint (CBC) analysis data. We develop a statistical efficiency measure and an algorithm to construct efficient CP designs. We compare incentive-compatible CP to incentive-compatible CBC in a series of three experime...
Decades ago, two nonoverlapping crypt stem cell populations were proposed: Leblond's Crypt Base Columnar (CBC) cell and Potten's +4 cell. The identification of CBC markers including Lgr5 has confirmed Leblond's predictions that CBC cells are anatomically distinct, long-lived stem cells that permanently cycle. While Potten originally described +4 cells as proliferative and unusually radiation-se...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید