نتایج جستجو برای: block and path
تعداد نتایج: 16865781 فیلتر نتایج به سال:
This paper considers a problem of absolute stabilization with a speci ed level of disturbance attenuation for a class of uncertain systems in which the uncertainty is structured and satis es a certain integral quadratic constraint. The paper shows that an uncertain system is absolutely stabilizable with a speci ed level of disturbance attenuation if and only if there exists a solution to a corr...
FOX is a new family of block ciphers presented recently, which is based upon some results on proven security and has high performances on various platforms. In this paper, we construct some distinguishers between 3-round FOX and a random permutation of the blocks space. By using integral attack and collision-searching techniques, the distinguishers are used to attack on 4, 5, 6 and 7-round of F...
in order to evaluation of squash (cucurbita pepo) seed yield per fruit and its relations with other characteristics of fruit include: length, diameter, length: diameter ratio (fruit shape), flesh thickness, thousand seed weight and fruit weight, an experiment was conducted using 24 accessions of squash as a randomized complete-block design with three replications. morphological traits were eval...
Integral attacks form a powerful class of cryptanalytic techniques that have been widely used in the security analysis of block ciphers. The integral distinguishers are based on balanced properties holding with probability one. To obtain a distinguisher covering more rounds, an attacker will normally increase the data complexity by iterating through more plaintexts with a given structure under ...
Rijndael is a block cipher designed by V. Rijmen and J. Daemen and it was chosen in its 128-bit block version as AES by the NIST in October 2000. Three key lengths 128, 192 or 256 bits are allowed. In the original contribution describing Rijndael [4], two other versions have been described: Rijndael-256 and Rijndael-192 that respectively use plaintext blocks of length 256 bits and 192 bits unde...
This research aims enhancing the efficiency and reliability of PATH, the most widely used solver for mixed complementarity problems. A key component of the PATH algorithm is solving a series of linear complementary subproblems with a pivotal scheme. Improving the efficiency of the linear system routines (factor, solve, and update) required by the pivotal method is the critical computational iss...
Most of recent collision attacks on SHA-0 are based on the differential path given by Xiaoyun Wang et al. Their disturbance vector was thought to be the best one. We noticed that the way they calculate number of sufficient conditions is not accurate, and we also found some new properties of the third Boolean function MAJ (b ∧ c) ∨ (c ∧ d) ∨ (d ∧ b). In this paper we present a new disturbance ve...
This paper reports progress in the analysis of interconnections of nonlinear systems, employing the chronological formalism. A fundamental observation is the close analogy between feeding outputs of one system back as inputs to another system and the process of Lazard elimination which is at the root of Hall-Viennot bases and chronological products. Possible applications of the algebraic descri...
In this paper, we propose an accurate security evaluation methodology for block ciphers with a binary diffusion layers against division cryptanalysis. We illustrate the division property by the independence of variables, and exploit a one-toone mapping between division trails and invertible sub-matrices. We give a new way to model the propagation of division property of linear diffusion layers ...
This paper presents a technique for allowing untrusted database applications to perform trusted operations. The approach is based on the TCB subset architecture with a commercial database and a small amount of easily assurable, generic, trusted code for the multilevel operations. The approach uses a trusted path mechanism to stop the threat of Trojan horses.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید