نتایج جستجو برای: دوره 128 سالی
تعداد نتایج: 98691 فیلتر نتایج به سال:
A proposal for a simple AES-based stream cipher which is at least 2.5 times faster than AES both in software and in hardware.
We show how any party can encrypt data for an e-passport holder such that only with physical possession of the e-passport decryption is possible. The same is possible for electronic identity cards and driver licenses. We also indicate possible applications. Dutch passports allow for 160 bit security, theoretically giving sufficient security beyond the year 2079, exceeding current good practice ...
Bootstrapping in fully homomorphic encryption (FHE) over the integers is a homomorphic evaluation of the squashed decryption function suggested by van Dijk et al. The typical approach for the bootstrapping is representing the decryption function as a binary circuit with a fixed message space. All bootstrapping methods in FHEs over the integers use this approach; however, these methods require t...
Piecemeal development and support for organisational processes may lead to problems: first, it is difficult to know which processes should be supported, and, second, it is unlikely that piecemeal processes will work well together. The solution seems to lie in first developing a coherent process architecture. However, this raises a further problem: a number of different types of process architec...
We describe the implementation of a 128×128 crossbar switch in 90nm CMOS standard-cell ASIC technology. The crossbar operates at 750MHz and is 32-bits wide to provide a port capacity above 20Gb/s, while fitting in a silicon area as small as 6.6mm by filling it at the 90% level (control not included). Next, we arrange 128 1mm “user tiles” around the crossbar, forming a 150mm die, and we connect ...
miR-128, a brain-enriched microRNA, has been implicated in the control of neurogenesis and synaptogenesis but its potential roles in intervening processes have not been addressed. We show that post-transcriptional mechanisms restrict miR-128 accumulation to post-mitotic neurons during mouse corticogenesis and in adult stem cell niches. Whereas premature miR-128 expression in progenitors for upp...
الگوریتم رمز دنبالهیی (Welch - Gong) WG، یک الگوریتم رمز با کلیدی با طول متغیر ۸۰، ۹۶، ۱۱۲ و ۱۲۸ بیت است که با هدف شرکت در گروه ۲ پروژهی eSTREAM طراحی شده است. در این نوشتار به تحلیل الگوریتم رمز دنبالهیی 128- WG، و بررسی میزان مقاومت آن دربرابر حملهی تمایز مبتنی بر تقریب خطی پرداختهایم. با یافتن یک نقاب خطی مناسب برای بخش غیرخطی 128- WG، حملهی تمایز به الگوریتم- سادهشده )بدون در نظر گ...
Sleep plays a vital role in regulating physiological mechanisms in the human body. Nowadays, by the change of lifestyle and as a consequence of longer work hours and increased accessibility to media, sleep disturbance becomes a common problem in modern society. Many studies demonstrated that sleep disturbance triggers a systemic low-grade inflammation by increasing the level of several cytokine...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید