نتایج جستجو برای: Meet in the Middle

تعداد نتایج: 21220223  

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1391

peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...

2012
Yu Sasaki Lei Wang Yasuhide Sakai Kazuo Sakiyama Kazuo Ohta

2009
Dmitry Khovratovich Ivica Nikolic Ralf-Philipp Weinmann

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم ریاضی و مهندسی کامپیوتر 1392

heuristics are often used to provide solutions for flow shop scheduling problems.the performance of a heuristic is usually judged by comparing solutions and run times on test cases.this investigation proposes an analytical alternative ,called asymptotic convergence ,which tests the convergence of the heuristic to a lower bound as problem size grows. the test is a stronger variation of worst cas...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده اقتصاد 1391

reinsurance is widely recognized as an important instrument in the capital management of an insurance company as well as its risk management tool. this thesis is intended to determine premium rates for different types of reinsurance policies. also, given the fact that the reinsurance coverage of every company depends upon its reserves, so different types of reserves and the method of their calc...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم 1390

any change in the refractive index of a laser active medium can lead to serious degradation of beam quality, laser beam modes, laser performance and variation in the intensity distribution. alteration in the refractive index of laser active medium is especially notable in high power lasers. it is clear that in the laser beam production, the pumping agent induces a great amount of heat which...

1996
Paul C. van Oorschot Michael J. Wiener

Meet-in-the-middle attacks, where problems and the secrets being sought are decomposed into two pieces, have many applications in cryptanalysis. A well-known such attack on double-DES requires 256 time and memory; a naive key search would take 2112 time. However, when the attacker is limited to a practical amount of memory, the time savings are much less dramatic. For n the cardinality of the s...

Journal: :IACR Cryptology ePrint Archive 2009
Danilo Gligoroski Rune Steinsmo Ødegård

Based on the analysis made by van Oorschot and Wiener for the complexity of parallel memoryless collision search [5], we show that the memoryless meet-in-the-middle attack which is one part of the whole preimage attack of Khovratovich et. al. [3] on EDON-R hash function has complexity bigger than 2n.

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه لرستان - دانشکده ادبیات و علوم انسانی 1391

abstract governing was disorganized for years, when mongols attached to iran and it caused to clearing way for interference of mongols princes. dispatching of holaku to the west culminated in establishing iilkhanan government. holakus activities in destruction of abbaasis government and activities which shows his staying in iran, made force oulus juji to comparison against iilkhanis gover...

2001
Hikaru Morita Kazuo Ohta Shoji Miyaguchi

The closure test MCT (meet-in-the-middle closure test) was introduced to analyze the algebraic properties of cryptosystems [KaRiSh]. Since MCT needs a large amount of memory, it is hard to implement with an ordinary meet-in-the-middle method. As a feasible version of MCT, this paper presents a switching closure test S C T which based on a new memoryless meet-in-the-middle method. To achieve the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید