نتایج جستجو برای: 4 weaknesses

تعداد نتایج: 1322309  

1993
Joan Daemen René Govaerts Joos Vandewalle

In some applications for synchronous stream ciphers, the risk of loss of synchroniration cannot be eliminated completely. In these cases frequent rcsynchroniration or resynduonisation upon request may be necessary. In the paper it is shown that this can lead to significant deterioration of the cryptographic security. A powerful general attack on nonlinearly filtered linear (over Z,) systems is ...

Journal: :SIAM J. Comput. 1997
Charles H. Bennett Ethan Bernstein Gilles Brassard Umesh V. Vazirani

Recently a great deal of attention has been focused on quantum computation following a sequence of results [Bernstein and Vazirani, in Proc. 25th Annual ACM Symposium Theory Comput., 1993, pp. 11–20, SIAM J. Comput., 26 (1997), pp. 1411–1473], [Simon, in Proc. 35th Annual IEEE Symposium Foundations Comput. Sci., 1994, pp. 116–123, SIAM J. Comput., 26 (1997), pp. 1474–1483], [Shor, in Proc. 35th...

Journal: :Physical review. E, Statistical, nonlinear, and soft matter physics 2009
J Machta

Parallel tempering, also known as replica exchange Monte Carlo, is studied in the context of two simple free-energy landscapes. The first is a double-well potential defined by two macrostates separated by a barrier. The second is a "golf course" potential defined by microstates having two possible energies with exponentially more high-energy states than low-energy states. The equilibration time...

2006
John H. Maindonald

Predictive accuracy claims should give explicit descriptions of the steps followed, with access to the code used. This allows referees and readers to check for common traps, and to repeat the same steps on other data. Feature selection and/or model selection and/or tuning must be independent of the test data. For use of cross-validation, such steps must be repeated at each fold. Even then, such...

2011
Juliane Krämer Dmitry Nedospasov Jean-Pierre Seifert

This work presents several classes of messages that lead to data leakage during modular exponentiation. Such messages allow for the recovery of the entire secret exponent with a single power measurement. We show that padding schemes as defined by industry standards such as PKCS#1 and ANSI x9.31 are vulnerable to side-channel attacks since they meet the characteristics defined by our classes. Th...

Journal: :Sustainability 2023

This research assessed the urban sustainability of all 14 districts Cambodian capital Phnom Penh to identify weaknesses and improvement potentials achieve national development goals; New Urban Agenda (NUA); Sustainable Development Goals (SDGs) 11 (sustainable cities communities), 4 (quality education), 5 (gender equality). The indicators’ selection was based on available data. analysis indicato...

2017
Joseph Kimuli Balikuddembe Ali Ardalan Davoud Khorasani-Zavareh Amir Nejati Owais Raza

BACKGROUND Pre-hospital emergency care is a vital and integral component of health systems particularly in the resource constrained countries like Uganda. It can help to minimize deaths, injuries, morbidities, disabilities and trauma caused by the road traffic incidents (RTIs). This study identifies the weaknesses and capacities affecting the pre-hospital emergency care for the victims of RTIs ...

Journal: :The International Journal of Evidence & Proof 2009

Journal: :Studia Universitatis „Vasile Goldis” Arad – Economics Series 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید