نتایج جستجو برای: دوره 128 سالی

تعداد نتایج: 98691  

2005
Alex Biryukov

A proposal for a simple AES-based stream cipher which is at least 2.5 times faster than AES both in software and in hardware.

Journal: :CoRR 2017
Eric R. Verheul

We show how any party can encrypt data for an e-passport holder such that only with physical possession of the e-passport decryption is possible. The same is possible for electronic identity cards and driver licenses. We also indicate possible applications. Dutch passports allow for 160 bit security, theoretically giving sufficient security beyond the year 2079, exceeding current good practice ...

Journal: :IACR Cryptology ePrint Archive 2017
Jung Hee Cheon Kyoohyung Han Duhyeong Kim

Bootstrapping in fully homomorphic encryption (FHE) over the integers is a homomorphic evaluation of the squashed decryption function suggested by van Dijk et al. The typical approach for the bootstrapping is representing the decryption function as a binary circuit with a fixed message space. All bootstrapping methods in FHEs over the integers use this approach; however, these methods require t...

2004
Stewart Green Martyn A. Ould

Piecemeal development and support for organisational processes may lead to problems: first, it is difficult to know which processes should be supported, and, second, it is unlikely that piecemeal processes will work well together. The solution seems to lie in first developing a coherent process architecture. However, this raises a further problem: a number of different types of process architec...

Journal: :International Journal of Distributed Sensor Networks 2015

2010
Giorgos Passas Manolis Katevenis Dionisios N. Pnevmatikatos

We describe the implementation of a 128×128 crossbar switch in 90nm CMOS standard-cell ASIC technology. The crossbar operates at 750MHz and is 32-bits wide to provide a port capacity above 20Gb/s, while fitting in a silicon area as small as 6.6mm by filling it at the 90% level (control not included). Next, we arrange 128 1mm “user tiles” around the crossbar, forming a 150mm die, and we connect ...

2015
Eleonora Franzoni Sam A Booker Srinivas Parthasarathy Frederick Rehfeld Sabine Grosser Swathi Srivatsa Heiko R Fuchs Victor Tarabykin Imre Vida F Gregory Wulczyn

miR-128, a brain-enriched microRNA, has been implicated in the control of neurogenesis and synaptogenesis but its potential roles in intervening processes have not been addressed. We show that post-transcriptional mechanisms restrict miR-128 accumulation to post-mitotic neurons during mouse corticogenesis and in adult stem cell niches. Whereas premature miR-128 expression in progenitors for upp...

الگوریتم رمز دنباله‌یی (Welch - Gong) WG، یک الگوریتم رمز با کلیدی با طول متغیر ۸۰، ۹۶، ۱۱۲ و ۱۲۸ بیت است که با هدف شرکت در گروه ۲ پروژه‌ی eSTREAM طراحی شده است. در این نوشتار به تحلیل الگوریتم رمز دنباله‌یی 128- WG، و بررسی میزان مقاومت آن دربرابر حمله‌ی تمایز مبتنی بر تقریب خطی پرداخته‌ایم. با یافتن یک نقاب خطی مناسب برای بخش غیرخطی 128- WG، حمله‌ی تمایز به الگوریتم- ساده‌شده )بدون در نظر گ...

Sleep plays a vital role in regulating physiological mechanisms in the human body. Nowadays, by the change of lifestyle and as a consequence of longer work hours and increased accessibility to media, sleep disturbance becomes a common problem in modern society. Many studies demonstrated that sleep disturbance triggers a systemic low-grade inflammation by increasing the level of several cytokine...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید