نتایج جستجو برای: rao nam cryptosystem

تعداد نتایج: 16923  

2011
XINGYUAN WANG YISONG TAN

In this paper, the authors propose a new chaotic block cryptosystem based on multiple one-dimensional chaotic maps. In the proposed cryptosystem, the authors establish map-to-task relations between the multiple chaotic maps and the tasks, which must be performed in the encryption rounds. The encryption process is based on these map-to-task relations. The authors enhance the security of the cryp...

Journal: :Des. Codes Cryptography 2004
Aggelos Kiayias Moti Yung

Recently, Augot and Finiasz presented a coding theoretic public key cryptosystem that suggests a new approach for designing such systems based on the Polynomial Reconstruction Problem. Their cryptosystem is an instantiation of this approach under a specific choice of parameters which, given the state of the art of coding theory, we show in this work to be sub-optimal. Coron showed how to attack...

2016
Rachana Srivastava Satyam Gaur Tuhina Ghosh

Cleft lip and palate (CLP) is the most common congenital deformity of the oral cavity. Recently, nasoalveolar moulding (NAM) has evolved as a presurgical technique which reduces the severity of the oronasal defect. NAM improves the facial appearance and function by moulding the nasal cartilages, premaxilla, and the alveolar ridges before the corrective surgical procedures. Utilization of the NA...

2015
Liang Zhang Rujun Ma Jin Hu Xiaolin Ding Yinxue Xu Meijia Zhang

Sirtuins have been implicated in diverse biological processes, including oxidative stress, energy metabolism, cell migration, and aging. Here, we employed Sirtuin inhibitors, nicotinamide (NAM) and Sirtinol, to investigate their effects on porcine oocyte maturation respectively. The rate of polar body extrusion in porcine oocytes decreased after treatment with NAM and Sirtinol, accompanied with...

2015
Bin Na Seo Su Han Park Jeong Yeol Yang Kyung Min Son Ji Seon Cheon

Nasoalveolar molding (NAM) device is an effective treatment for protruding maxilla in infants with cleft palate. However, only a few studies have investigated the effect of NAM devices on the treatment of protruding maxilla in infants with cleft lip only. We have designed a combination treatment using NAM devices prior to cheiloplasy for cleft lip-only patients with severe anterior protrusion o...

1999
PETER JÄGER PAKAWIN DANKITTIPAKUL

Clubionidae collected in Laos and Thailand were investigated. Seven new species are described: Clubiona kai spec. nov. (male: Laos, Luang Prabang Prov.), Clubiona lala spec. nov. (female: Laos, Luang Nam Tha Prov.), Clubiona maipai spec. nov. (male: Thailand, Mae Hong Son Prov.), Clubiona kuu spec. nov. (male: Laos, Luang Prabang Prov.), Clubiona vukomi spec. nov. (male: Laos, Luang Nam Tha Pro...

2007
Keita Xagawa Akinori Kawachi Keisuke Tanaka

Goldwasser and Kharchenko (TCC 2006) showed a proof of plaintext knowledge for the AjtaiDwork cryptosystem and left the open problem designing a proof of plaintext knowledge for the Regev’04 cryptosystem (JACM 2004). In this paper, we show a proof of plaintext knowledge for the Regev’04 cryptosystem (JACM 2004) using their technique. Furthermore, we show that it can be applied to the Regev’05 c...

Journal: :Des. Codes Cryptography 2007
Ki Hyoung Ko Jang-Won Lee Tony Thomas

Braid cryptosystem was proposed in CRYPTO 2000 as an alternate public-key cryptosystem. The security of this system is based upon the conjugacy problem in braid groups. Since then, there have been several attempts to break the braid cryptosystem by solving the conjugacy problem in braid groups. In this paper, we first survey all the major attacks on the braid cryptosystem and conclude that the ...

2011
SIAMAK HAGHIPOUR

RSA cryptosystem, the first public key cryptography presented in 1977. Neural networks are often used as a powerful discriminating estimator for tasks in function approximation. This paper describes a neural-network-based method relies on Radial Basis Function and Levenberg-Marquardt Backpropagation for estimating the behavior of the function used in RSA cryptosystem to calculate the function. ...

1996
Xuejia Lai Rainer A. Rueppel

The HKM / HFX cryptosystem is proposed for standardization at the ITU Telecommunication Standardization Sector Study Group 8. It is designed to provide authenticity and colffidentiality of FAX messages at a commercial level of security. In addition, the HKM / HFX cryptosystem is designed for unrestricted export. This paper contains the results of an analysis of the HKM/HFX cryptosystem. Eleven ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید