نتایج جستجو برای: block and path

تعداد نتایج: 16865781  

1998
Andrey V. Savkin Ian R. Petersen

This paper considers a problem of absolute stabilization with a speci ed level of disturbance attenuation for a class of uncertain systems in which the uncertainty is structured and satis es a certain integral quadratic constraint. The paper shows that an uncertain system is absolutely stabilizable with a speci ed level of disturbance attenuation if and only if there exists a solution to a corr...

2005
Feng Dengguo

FOX is a new family of block ciphers presented recently, which is based upon some results on proven security and has high performances on various platforms. In this paper, we construct some distinguishers between 3-round FOX and a random permutation of the blocks space. By using integral attack and collision-searching techniques, the distinguishers are used to attack on 4, 5, 6 and 7-round of F...

Journal: :علوم باغبانی 0
رحیم برزگر سعدالله هوشمند غلامعلی پیوست

in order to evaluation of squash (cucurbita pepo) seed yield per fruit and its relations with other characteristics of fruit include: length, diameter, length: diameter ratio (fruit shape), flesh thickness, thousand seed weight and fruit weight, an experiment was conducted using 24 accessions of squash as a randomized complete-block design with three replications. morphological traits were eval...

2016
Meiqin Wang Tingting Cui Huaifeng Chen Ling Sun Long Wen Andrey Bogdanov

Integral attacks form a powerful class of cryptanalytic techniques that have been widely used in the security analysis of block ciphers. The integral distinguishers are based on balanced properties holding with probability one. To obtain a distinguisher covering more rounds, an attacker will normally increase the data complexity by iterating through more plaintexts with a given structure under ...

2008
Samuel Galice Marine Minier

Rijndael is a block cipher designed by V. Rijmen and J. Daemen and it was chosen in its 128-bit block version as AES by the NIST in October 2000. Three key lengths 128, 192 or 256 bits are allowed. In the original contribution describing Rijndael [4], two other versions have been described: Rijndael-256 and Rijndael-192 that respectively use plaintext blocks of length 256 bits and 192 bits unde...

2009
Qian Li Michael C. Ferris Todd Munson

This research aims enhancing the efficiency and reliability of PATH, the most widely used solver for mixed complementarity problems. A key component of the PATH algorithm is solving a series of linear complementary subproblems with a pivotal scheme. Improving the efficiency of the linear system routines (factor, solve, and update) required by the pivotal method is the critical computational iss...

Journal: :J. Inf. Sci. Eng. 2010
Shuang Wu Dengguo Feng Wenling Wu

Most of recent collision attacks on SHA-0 are based on the differential path given by Xiaoyun Wang et al. Their disturbance vector was thought to be the best one. We noticed that the way they calculate number of sufficient conditions is not accurate, and we also found some new properties of the third Boolean function MAJ (b ∧ c) ∨ (c ∧ d) ∨ (d ∧ b). In this paper we present a new disturbance ve...

2000
Matthias Kawski

This paper reports progress in the analysis of interconnections of nonlinear systems, employing the chronological formalism. A fundamental observation is the close analogy between feeding outputs of one system back as inputs to another system and the process of Lazard elimination which is at the root of Hall-Viennot bases and chronological products. Possible applications of the algebraic descri...

Journal: :IACR Cryptology ePrint Archive 2017
Wenying Zhang Vincent Rijmen

In this paper, we propose an accurate security evaluation methodology for block ciphers with a binary diffusion layers against division cryptanalysis. We illustrate the division property by the independence of variables, and exploit a one-toone mapping between division trails and invertible sub-matrices. We give a new way to model the propagation of division property of linear diffusion layers ...

1997
Dan Thomsen

This paper presents a technique for allowing untrusted database applications to perform trusted operations. The approach is based on the TCB subset architecture with a commercial database and a small amount of easily assurable, generic, trusted code for the multilevel operations. The approach uses a trusted path mechanism to stop the threat of Trojan horses.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید