نتایج جستجو برای: مدلهای gcm

تعداد نتایج: 8113  

Journal: :IACR Cryptology ePrint Archive 2004
David A. McGrew John Viega

The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing based on multiplication in a binary finite field. We analyze its security and performance, and show that it is the most efficient mode of operation for high speed packet networks, by using a realistic model of a network crypto module and e...

Journal: :IACR Cryptology ePrint Archive 2011
Markku-Juhani O. Saarinen

Sophie Germain Counter Mode (SGCM) is an authenticated encryption mode of operation, to be used with 128-bit block ciphers such as AES. SGCM is a variant of the NIST standardized Galois / Counter Mode (GCM) which has been found to be susceptible to weak key / short cycle forgery attacks. The GCM attacks are made possible by its extremely smooth-order multiplicative group which splits into 512 s...

Journal: :Physical Review C 2023

An implementation of the generalized time-dependent generator coordinated method (TD-GCM) is developed, that can be applied to dynamics small- and large-amplitude collective motion atomic nuclei. Both states weight functions GCM correlated wave function depend on time. The initial are obtained as solutions deformation-constrained self-consistent mean-field equations, evolved in time by standard...

Journal: :The Journal of Cell Biology 2006
Alla Katsnelson

10.1083/jcb.1723r r3jcb17 23rr3A lla Katsnelson< cor> [email protected] m E. col i squeezed into action E scherichia coli chemoreceptors double as osmotic sensors by mechanically compressing in response to increased osmolarity, say Ady Vaknin and Howard Berg (Harvard University, Cambridge, MA). E. coli is always on the look-out for a better environment....

2015
Misa Hayase Koichi Nagashima Mahoto Kato Daisuke Fukamachi Kazuki Iso Masaru Arai Yoshihiro Nakamura Yukino Iwasawa Haruna Nishimaki Yoshiaki Kusumi Yasuo Okumura Satoshi Kunimoto Atsushi Hirayama

BACKGROUND Giant cell myocarditis (GCM) is rapidly progressive fulminant myocarditis causing death or requiring cardiac transplantation despite various immunosuppression therapies. CASE REPORT A 28-year-old woman with progressive shortness of breath and palpitation following an upper respiratory infection was referred to our institution. On admission, transthoracic echocardiography (TTE) reve...

Journal: :The Journal of physiology 2001
K Nägler D H Mauch F W Pfrieger

1. To study the effects of glial cells on synapse formation, we established microcultures of purified rat retinal ganglion cells (RGCs) and monitored synapse (autapse) development in single neurones using electrophysiological recordings, FM1-43 labelling and immunocytochemistry. 2. Solitary neurones grew ramifying neurites, but formed only very few and inefficient excitatory autapses, when cult...

2007
Munindar P. Singh

Protocols structure interactions among communicating agents. A commitment machine models a protocol in terms of how the commitments of the various parties evolve. Commitment machines thus support flexible behavior while providing a meaningful basis for compliance with a protocol. Unfortunately, current formulations of commitment machines are not sufficiently general or rigorous. This paper deve...

2015
Conrado Porto Lopes Gouvêa Julio López Hernandez

The Galois/Counter Mode is an authenticated encryption scheme which is included in protocols such as TLS and IPSec. Its implementation requires multiplication over a binary finite field, an operation which is costly to implement in software. Recent processors have included instructions aimed to speed up binary polynomial multiplication, an operation which can be used to implement binary field m...

Journal: :IACR Cryptology ePrint Archive 2015
Yuichi Niwa Keisuke Ohashi Kazuhiko Minematsu Tetsu Iwata

A constant of 2 appears in the security bounds of the Galois/Counter Mode of Operation, GCM. In this paper, we first develop an algorithm to generate nonces that have a high counter-collision probability. We show concrete examples of nonces with the counter-collision probability of about 2/2. This shows that the constant in the security bounds, 2, cannot be made smaller than 2 if the proof reli...

2017
Atul Luykx Bart Mennink Kenneth G. Paterson

The multi-key, or multi-user, setting challenges cryptographic algorithms to maintain high levels of security when used with many different keys, by many different users. Its significance lies in the fact that in the real world, cryptography is rarely used with a single key in isolation. A folklore result, proved by Bellare, Boldyreva, and Micali for public-key encryption in EUROCRYPT 2000, sta...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید