نتایج جستجو برای: guess and determine attack
تعداد نتایج: 16846896 فیلتر نتایج به سال:
Lexical inferencing is one of the most important strategies in vocabulary learning and it plays an important role in dealing with unknown words in a text. In this regard, the aim of this study was to determine the lexical inferencing strategies used by Iranian EFL learners when they encounter unknown words at both text and sentence levels. To this end, forty lower intermediate students were div...
1 In this article an optimal selection of tap positions for certain LFSR-based encryption schemes is investigated from both design and cryptanalytic perspective. Two novel algorithms towards an optimal selection of tap positions are given which can be satisfactorily used to provide (sub)optimal resistance to some generic cryptanalytic techniques applicable to these schemes. It is demonstrated t...
abstract: literature is said beautiful words of poetry or prose that excites reader’s or listener’s feel. certainly, to be effective, such a text should have certain characteristics. the four elements of the literature: thought, imagination, emotion and style make a text to be literary and effective. emotion and imagination are specific elements of literary texts, while thought and style a...
PURPOSE To determine whether patients can guess their intraocular pressure (IOP). DESIGN Patient survey. METHODS We asked consecutive patients to guess their IOP and then indicate the IOP and the symptoms that allowed them to guess. RESULTS Of 132 patients, 22 (17%) believed they could guess their IOP, usually based on a periocular symptom (n = 20, 91%). Nine of these patients (45%) corre...
asymmetric membranes are widely used in many industrial membrane separation processes. the major advantage of membrane filtration over the conventional process is its ability to remove a wider spectrum of particles without using any chemicals. hollow fiber configuration offer many advantages over flat-sheet or tubular membranes. the spinning process of hollow fiber may look simple, yet it is te...
At EUROCRYPT 2012 Pandey and Rouselakis introduced the notion of property preserving symmetric encryption which enables checking for a property on plaintexts by running a public test on the corresponding ciphertexts. Their primary contributions are: (i) a separation between ‘find-then-guess’ and ‘left-or-right’ security notions; (ii) a concrete construction for left-or-right secure orthogonalit...
The impossible differential attack is one of the most fundamental tools cryptanalysis and has been successfully applied to a large variety block ciphers. In typical attack, foundation first step construct an differential. Nowadays, two kinds commonly used approaches in construction are matrix-based tool-aided automatic search methods. this paper, we proposed new method combining early-abort str...
reinsurance is widely recognized as an important instrument in the capital management of an insurance company as well as its risk management tool. this thesis is intended to determine premium rates for different types of reinsurance policies. also, given the fact that the reinsurance coverage of every company depends upon its reserves, so different types of reserves and the method of their calc...
QuiSci is incredible fast, faster than most other ciphers. On modern CPUs it needs only arround 1 clock cycle per byte, so it is 10 times fast than most other well-known algorithm. On the website of QuiSci [1] it is claimed that this algorithm is secure. With this paper I like to show a key recovery attack on QuiSci, exploiting the weak key setup. When you are able to guess the beginning of the...
Normally computer users use a passphrase or a password to encrypt secret values in computer systems. In this case, to prevent the brute–force attack, the password should be long enough and difficult to guess. But, such kind of passwords are also difficult for the human beings to remember. In this paper, we propose a method for protecting secret keys. A secret key means secret value like the pas...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید