نتایج جستجو برای: guess and determine attack
تعداد نتایج: 16846896 فیلتر نتایج به سال:
the speech act of disagreement has been one of the speech acts that has received the least attention in the field of pragmatics. this study investigates the ways power relations, social distance, formality of the context, gender, and language proficiency (for efl learners) influence disagreement and politeness strategies. the participants of the study were 200 male and female native persian s...
The Kupyna hash function was selected as the new Ukrainian standard DSTU 7564:2014 in 2015. It is designed to replace the old Independent States (CIS) standard GOST 34.311-95. The Kupyna hash function is an AES-based primitive, which uses Merkle-Damg̊ard compression function based on Even-Mansour design. In this paper, we show the first cryptanalytic attacks on the round-reduced Kupyna hash func...
We use ideas from game theory to transform two families of authentication protocols so that even if an intruder attacks a protocol, its payoff will still be lower than when it does not. This is particularly useful in resisting or discouraging a powerful and rational intruder (as present in military applications) who makes many attempts to break a protocol because (1) even if the intruder fails,...
Since the security analysis against stream ciphers becomes more difficult nowadays, it is urgent and significant to propose new generic methods. In this work, we introduce guess-and-determine techniques to two traditional analysis methods and make the new approaches methodological for generalization. We show the power of the new methods by analyzing two stream ciphers: Grain-v1 and ACORN. Grain...
Design of secure light-weight stream ciphers is an important area in cryptographic hardware & embedded systems and a very recent design by Armknecht and Mikhalev (FSE 2015) has received serious attention that uses shorter internal state and still claims to resist the time-memory-data-tradeoff (TMDTO) attacks. An instantiation of this design paradigm is the stream cipher named Sprout with 80-bit...
Introduction In classical methods of statistics, the parameter of interest is estimated based on a random sample using natural estimators such as maximum likelihood or unbiased estimators (sample information). In practice, the researcher has a prior information about the parameter in the form of a point guess value. Information in the guess value is called as nonsample information. Thomp...
within the components of communicative competence, a special emphasis is put on the “rules of politeness,” specifically the politeness strategies (brown and levinson, 1978) that speakers deploy when performing the request speech act. this is because the degree of imposition that making a request places upon one’s interlocutor(s) has been seen to be influenced by several factors among which, as ...
بررسی ارزش غذایی تاغ و عمل آوری آن با سود و آهک در مراحل مختلف رشدبا استفاده از روش کیسه های نایلونی
abstract this study is carried out to determine the chemical composition in the three vegetative stages of the haloxylon sp., degradation parameters, with adding naoh and ca(oh2 ). for this purpose, in may and october and january 2010 enough some haloxylon sp. of the ammary area was prepared. crude protein and ash percentage are decrease, neutral detergent fiber percentage with pragress stage ...
Generic distinguishers against Feistel Network with up to 5 rounds exist in the regular setting and up to 6 rounds in a multi-key setting. We present new cryptanalyses against Feistel Networks with 5, 6 and 7 rounds which are not simply distinguishers but actually recover completely the unknown Feistel functions. When an exclusive-or is used to combine the output of the round function with the ...
this thesis attempts to investigate the effects of prelistening activities on enhancing iranian efl learners` listening comprehension. the present study investigated ways in which learners` background knowledge could be activated in order to enhance their l2 listening comprehension by limiting the number of possible text interpretations prior to listening. the experiments conducted in this stud...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید