نتایج جستجو برای: cube attack

تعداد نتایج: 91114  

Journal: :Proyecciones 2021

Consider a graph G with |V (G)| = p and |E(G)| q let f : V (G) → {k, k + 1, 2, . − 1}} be an injective function. The induced edge labeling ∗ for vertex is defined by (e) all e uv ∈ E(G) bijective. If f(V (G)) ∪ {f E(G)} , 1}, then called k-super cube root mean labeling. such exists, graph. In this paper, I introduce prove the existence of to graphs viz., triangular snake Tn, double D(Tn), Quadr...

Journal: :IACR Cryptology ePrint Archive 2012
Itai Dinur Orr Dunkelman Nathan Keller Adi Shamir

In this paper we show that a large class of diverse problems have a bicomposite structure which makes it possible to solve them with a new type of algorithm called dissection, which has much better time/memory tradeoffs than previously known algorithms. A typical example is the problem of finding the key of multiple encryption schemes with r independent n-bit keys. All the previous error-free a...

Journal: :international journal of epidemiology research 0
seyed mehdi hosseini student research committee, epidemiology dept., hamadan university of medical sciences, hamadan, i.r. iran masoud parvin student research committee, epidemiology dept., hamadan university of medical sciences, hamadan, i.r. iran masoud bahrami student research committee, epidemiology dept., hamadan university of medical sciences, hamadan, i.r. iran manoochehr karami social determinants of health research center, hamadan university of medical sciences, hamadan, i.r. iran; epidemiology dept., hamadan university of medical sciences, hamadan, i.r. iran meysam olfatifar student research committee, epidemiology dept., hamadan university of medical sciences, hamadan, i.r. iran

background and aims: one of the most common approach to understanding spatial and temporal trends of event data is to break it up into a series of time snapshots. therefore space-time cube method applied in order to portray the likely trend in occurrence of the pulmonary tuberculosis (tb) cases. methods: in this study, information of all patients with pulmonary tb recorded in surveillance syste...

1994
Antoine DEZA Michel DEZA

We study the skeleton of several polytopes related to the n-cube, the halved n-cube, and the folded n-cube. In particular, the Gale polytope of the n-cube, its dual and the duals of the halved n-cube and the complete bipartite sub-graphs polytope.

Journal: :Electronic Colloquium on Computational Complexity (ECCC) 2016
Amey Bhangale Irit Dinur Inbal Livni Navon

We revisit the Raz-Safra plane-vs.-plane test and study the closely related cube vs. cube test. In this test the tester has access to a “cubes table” which assigns to every cube a low degree polynomial. The tester randomly selects two cubes (affine sub-spaces of dimension 3) that intersect on a point x ∈ F, and checks that the assignments to the cubes agree with each other on the point x. Our m...

2008
Dong Jin Tatsuo Tsuji Ken Higuchi

Data cube construction is a commonly used operation in data warehouses. Because of the volume of data stored and analyzed in a data warehouse and the amount of computation involved in data cube construction, incremental maintenance of data cube is really effective. To maintain a data cube incrementally, previous methods were mainly for relational databases. In this paper, we employ an extendibl...

2015
Ali M Alshahrani Stuart Walker

Cryptography is a security technique that must be applied in both communication sides to protect the data during its transmission through the network from all kinds of attack. On the sender side, the original data will be changed into different symbols or shapes by using a known key; this is called encryption. On the other communication side, the decryption process will be done and the data wil...

Journal: :Journal of Innovation Management 2015

Journal: :Journal of Communications Software and Systems 2011

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید