نتایج جستجو برای: feal
تعداد نتایج: 271 فیلتر نتایج به سال:
B2 ordered FeAl films with a small, uniform grain size have been produced by rf diode sputter deposition on glass substrates. CoCrPt films grown on FeAl underlayers were found to have the ~101̄0! lamellar texture. The in-plane coercivities (Hc) of the CoCrPt/FeAl films are comparable to those of the CoCrPt/Cr films and they can be further improved by inserting a thin Cr intermediate layer betwee...
Fe-Al alloys in the aluminium range of 55-65 at.% exhibit a lamellar microstructure of B2-ordered FeAl and triclinic FeAl2, which is caused by a eutectoid decomposition of the high-temperature Fe5Al8 phase, the so-called ∊ phase. The orientation relationship of FeAl and FeAl2 has previously been studied by Bastin et al. [J. Cryst. Growth (1978 ▸), 43, 745] and Hirata et al. [Philos. Mag. Lett. ...
We describe the results of experiments on the use of multiple approximations in a linear cryptanalytic attack on FEAL; we pay particular attention to FEAL-8. While these attacks on FEAL are interesting in their own right, many important and intriguing issues in the use of multiple approximations are brought to light.
Fe-Al intermetallic alloys with aluminum content over 60 at% are in the area of the phase equilibrium diagram that is considerably less investigated in comparison to the high-symmetry Fe₃Al and FeAl phases. Ambiguous crystallographic information and incoherent data referring to the phase equilibrium diagrams placed in a high-aluminum range have caused confusions and misinformation. Nowadays une...
This paper discusses the security of the Fast Data Encipherment Algorithm (FEAL) against Linear Cryptanalysis. It has been confirmed that the entire subkeys used in FEAL–8 can be derived with 2 pairs of known plaintext and ciphertext with a success rate over 70% spending about 1 hour using a WS (SPARCstation 10 Model 30). This paper also evaluates the security of FEAL–N in comparison with that ...
1 Evaluation of security 1.1. Differential cryptanalysis In extending differential cryptanalysis, Aoki , Kobayashi, and Moriai [1] greatly reduced the computational amount needed [2]. They determined that differential cryptanalysis could not be applied to FEAL with more than 32 rounds. Biham et al. [3] proposed a new cyptanalysis of Skipjack [4] using impossible differentials. Although regular ...
The FEAL N cryptosystem has been developed by N T T as a highly programming e cient block cipher system as it does not use look up tables It was rst presented in It is essentially an N round Feistel block cipher operating on bit blocks and determined by a bit key FEAL is the standard block cipher but N T T intend that FEAL can be used in cipher block chaining mode when plaintexts are not reveal...
to linear cryptanalysis. We also described how to sum up characteristics (which also hold in diierential cryptanalysis). The iteration of this characteristic to seven rounds have probability 1=2 ? 2 ?11. A similar characteristic exist with a reverse order of the bytes in each word. From the tables in 9] we can see that about 4 2 112 = 2 24 known plaintexts are required to attack Feal-8, with su...
It is important to find the best linear expression to estimate the vulnerability of cryptosystems to Linear Cryptanalysis. This paper presents a method to improve Matsui’s search algorithm which determines the best linear expression. This method is based on analyzing the dominant factor of search complexity. We introduce the search pattern in order to reduce unnecessary search candidates, and a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید