نتایج جستجو برای: concrete block
تعداد نتایج: 233661 فیلتر نتایج به سال:
Much recent research work discusses the transformation between different process modelling languages. This work, however, is mainly focussed on specific process modelling languages, and thus the general reusability of the applied transformation concepts is rather limited. In this paper, we aim to abstract from concrete transformation strategies by distinguishing two major paradigms for represen...
This work describes a mode of operation, TET, that turns a regular block cipher into a length-preserving enciphering scheme for messages of (almost) arbitrary length. When using an n-bit block cipher, the resulting scheme can handle input of any bit-length between n and 2 and associated data of arbitrary length. The mode TET is a concrete instantiation of the generic mode of operation that was ...
We analyze the security of the CTR + CBC-MAC (CCM) encryption mode. This mode, proposed by Doug Whiting, Russ Housley, and Niels Ferguson, combines the CTR (“counter”) encryption mode with CBC-MAC message authentication and is based on a block cipher such as AES. We present concrete lower bounds for the security of CCM in terms of the security of the underlying block cipher. The conclusion is t...
The standardized integrity algorithm f9 of the 3GPP algorithm computes a MAC (Message Authentication Code) to establish the integrity and the data origin of the signalling data over a radio access link of W-CDMA IMT-2000. The function f9 is based on the block cipher KASUMI and it can be considered as a variant of CBC-MAC. In this paper we examine the provable security of f9. We prove that f9 is...
At CT-RSA 2017, List and Nandi proposed two variable input length pseudorandom functions (VI-PRFs) called PMACx and PMAC2x, and a deterministic authenticated encryption scheme called SIVx. These schemes use a tweakable block cipher (TBC) as the underlying primitive, and are provably secure up to the query complexity of 2, where n denotes the block length of the TBC. In this paper, we falsify th...
Much recent research work discusses the transformation between different process modeling languages. This work, however, is mainly focussed on specific process modeling languages, and thus the general reusability of the applied transformation concepts is rather limited. In this article, we aim to abstract from concrete transformations by distinguishing two major paradigms for representing contr...
Underground coal mining is one of the most dangerous occupations. Years of effort have been dedicated to researching methods of characterizing mine roof and floor for improving the mining environment. This research investigates using a neural network to classify rock strata based on the physical parameters of a roof bolting drill. This paper presents our methodology, as well as early results ba...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید