نتایج جستجو برای: mutamid 256

تعداد نتایج: 12691  

2006
Krystian Matusiewicz Scott Contini Josef Pieprzyk

This note presents analysis of the compression function of a recently proposed hash function, FORK-256. We exhibit some unexpected differentials existing for the step transformation and show their possible uses in collision-finding attacks on different simplified variants of FORK-256. Finally, as a concrete application of those observations we present a method of finding chosen IV collisions fo...

1999
Basabi Bhaumik Pravas Pradhan G. S. Visweswaran Rajamohan Varambally Anand Hardi

In this paper a low power SRAM design is presented. Existing SRAM architectures used in SGSThomson were studied to explore the possibilities in bringing down power dissipation in various blocks. A Divided word line (DWL) scheme was implemented. Particular emphasis was put to reduce power consumption in decoders. A new critical path model was introduced for schematic simulation. This lowered the...

2005
Krystian Matusiewicz Josef Pieprzyk Norbert Pramstaller Christian Rechberger Vincent Rijmen

In this paper we analyse the role of some of the building blocks of SHA-256. We show that the disturbance-correction strategy is applicable to the SHA-256 architecture and we prove that functions Σ, σ are vital for the security of SHA-256 by showing that for a variant without them it is possible to find collisions with complexity 2 hash operations. As a step towards an analysis of the full func...

2011
Marine Minier María Naya-Plasencia Thomas Peyrin

In this article, we provide the first independent analysis of the (2-round tweaked) 256-bit version of the SHA-3 candidate SHAvite-3. By leveraging recently introduced cryptanalysis tools such as rebound attack or Super-Sbox cryptanalysis, we are able to derive chosen-related-salt distinguishing attacks on the compression function on up to 8 rounds (12 rounds in total) and free-start collisions...

Journal: :Cancer research 1974
T P Waalkes K Sanders R G Smith R H Adamson

Walker 256 carcinosarcoma in rats has been a useful tu mor for the evaluation of potential chemotherapeutic agents. Recently, several compounds with proven antiviral activity were also shown to inhibit the growth of Walker 256 carcinosarcoma, suggesting the possibility that an oncogenic virus, through a mechanism such as recruitment, for example, might be an essential factor for the growth of t...

Journal: :IACR Cryptology ePrint Archive 2012
Shao-zhen Chen Tian-min Xu

In this paper, combining the biclique cryptanalysis with the MITM attack, we present the first key recovery method for the full ARIA256 faster than brute-force. The attack requires 280 chosen plaintexts, and the time complexity is about 2255.2 full-round ARIA encryptions in the processing phase. keywords: Block Cipher; ARIA-256; Biclique structure

1992
Robert G. Edwards Sabino José Ferreira Jonathan Goodman Alan D. Sokal

We study the dynamic critical behavior of the multi-grid Monte Carlo (MGMC) algorithm with piecewise-constant interpolation applied to the two-dimensional O(4)symmetric nonlinear σ-model [= SU(2) principal chiral model], on lattices up to 256 × 256. We find a dynamic critical exponent zint,M2 = 0.60 ± 0.07 for the Wcycle and zint,M2 = 1.13 ± 0.11 for the V-cycle, compared to zint,M2 = 2.0 ± 0.1...

2007
Les Davies

Explanation.................................................................................................. 256 Evaluation for acceptable daily intake......................................................... 256 Biochemical aspects............................................................................... 256 Absorption, distribution, and excretion ...........................................

Journal: :IACR Cryptology ePrint Archive 2014
Leibo Li Keting Jia

Camellia is one of the widely used block ciphers, which has been selected as an international standard by ISO/IEC. In this paper, we focus on the key-recovery attacks on reduced-round Camellia-192/256 with meet-in-the-middle methods. We utilize multiset and the differential enumeration methods which are popular to analyse AES in the recent to attack Camellia-192/256. We propose a 7-round proper...

2009
Xavier Bresson

This is a short note to explain how to efficiently minimize the nonlocal Total Variation (NLTV) energy. The method is based on the Split-Bregman (SB), introduced by Goldstein-Osher in [8], and extended to a nonlocal/graph version by Zhang-Burger-Bresson-Osher in [13]. For the 256 × 256 Barbara picture, the computation of weights takes around 1 second for a patch size 5 × 5 and a search window 1...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید