نتایج جستجو برای: abu isaac albiri

تعداد نتایج: 6450  

Journal: :IACR Cryptology ePrint Archive 2001
Marina Pudovkina

Stream ciphers are often used in applications where high speed and low delay are a requirement. The ISAAC keystream generator is a fast software-oriented encryption algorithm. In this papers the security of the ISAAC keystream generator is investigated. Cryptanalytic algorithm is developed for a known plaintext attack where only a small segment of plaintext is assumed to be known.

1981
Gordon S. Novak

ISAAC-11 , a program wh ich s o l v e s phys i c s problems s t a t e d i n E n g l i s h , w i l l b e d e n o n s t r a t e d i n r e a l t i n e . A notebook of p rob lens which have been s o l v e d by the p r o g r a n w i l l be d i s p l a y e d ; the d e n o n s t r a t i o n w i l l i n c l u d e p rob lens taken f r o m t h i s s e t . I n a d d i t i o n , new problems in e l e n e n...

Journal: :IACR Cryptology ePrint Archive 2006
Jean-Philippe Aumasson

This paper presents some properties of he deterministic random bit generator ISAAC (FSE’96), contradicting several statements of its introducing article. In particular, it characterizes huge subsets of internal states which induce a strongly non-uniform distribution in the 8 192 first bits produced. A previous attack on ISAAC presented at Asiacrypt’06 by Paul and Preneel is demonstrated to be n...

2018
Emily J. Howells Glenn Dunshea Dain McParland Grace O. Vaughan Scott F. Heron Morgan S. Pratchett John A. Burt Andrew G. Bauman

1 Center for Genomics and Systems Biology, New York University Abu Dhabi, Abu Dhabi, United Arab Emirates, 2 Ecological Marine Services, Millbank, QLD, Australia, 3 Natural History Museum of Denmark, University of Copenhagen, Copenhagen, Denmark, 4 NOAA/NESDIS/STAR Coral Reef Watch, College Park, MD, United States, 5 Marine Geophysical Laboratory, Physics Department, College of Science and Engi...

Journal: :NeuroRehabilitation 2003
Patrick Gorman Randy Dayle Carrie-Ann Hood Linda Rumrell

Cognitive rehabilitation has the capacity to empower persons with brain-injuries and help them achieve heightened functional, personal, and social interactions within their environments. Interventions aimed at compensation for deficits and adaptation to cognitive disability can be aided through the use of assistive technology devices (ATD's). ATDs allow for their users to experience greater lev...

1999
Thomas G. Rizzo

It has been recently suggested by Arkani-Hamed, Dimopoulos and Dvali that gravity may become strong at energies not far above the electroweak scale and thus remove the hierarchy problem. Such a scenario can be tested at both present and future accelerators since towers of Kaluza-Klein gravitons and associated scalar fields now play an important phenomenological role. In this paper we examine se...

Journal: :Pediatric clinics of North America 2003
Richard Beasley Philippa Ellwood Innes Asher

Like so much research, the findings from the ISAAC program have raised more questions than they have answered. Despite their limitations, the ISAAC findings provide the basis for further studies to investigate factors that potentially contribute to these international patterns and may lead to novel public health and pharmacologic intervention strategies that reduce the prevalence and severity o...

2007
Khalid Alnowibet Lotfi Tadj

In this paper, we investigate the bulk service queue with Bernoulli vacation schedule and restricted admissibility introduced and studied by Madan and Abu-Dayyeh, [Revista Investigacion Operacional, Vol.24, No.2, pp.113-123, 2003]. Madan and Abu-Dayyeh assume exponentially distributed service times while we allow these times to be generally distributed. We obtain various performance measures th...

2009
DEMETRI PSALTIS

Moment invariants are evaluated as a feature space for pattern recognition in terms of discrimination power and noise tolerance. The notion of complex moments is introduced as a simple and straightforward way to derive moment invariants. Through this relation, properties of complex moments are used to characterize moment invariants. Aspects of information loss, suppression, and redundancy encou...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید