نتایج جستجو برای: aes

تعداد نتایج: 8770  

2003
Song J. Park

Following paper examines hardware implementation methods regarding Advanced Encryption Standard (AES). Compared to software implementation, migrating to hardware provides higher level of security and faster encryption speed. An overview of existing AES hardware implementation techniques are summarized. Then the direction of reconfigurable coprocessor as a cryptography hardware is proposed. Keyw...

2004
Andreas Schuster Elisabeth Oswald

The AES is still the ”State of the Art” cryptographic algorithm, and power analysis attacks had shown that breaking traditionally said high secure ciphers (like AES) is done with a relative low effort. This paper describes how to perform such an attack on an AES implementation.

2004
Alex Biryukov

In this note we study security of 128-bit key 10-round AES against the boomerang attack. We show attacks on AES reduced to 5 and 6 rounds, much faster than the exhaustive key search and twice faster than the “Square” attack of the AES designers. The attacks are structural and apply to other SPN ciphers with incomplete diffusion.

2017
Mahima Mittal Jeromie Wesley Vivian Thangaraj Winsley Rose Valsan Philip Verghese C.P. Girish Kumar Mahim Mittal R. Sabarinathan Vijay Bondre Nivedita Gupta Manoj V. Murhekar

Outbreaks of acute encephalitis syndrome (AES) have been occurring in Gorakhpur Division, Uttar Pradesh, India, for several years. In 2016, we conducted a case-control study. Our findings revealed a high proportion of AES cases with Orientia tsutsugamushi IgM and IgG, indicating that scrub typhus is a cause of AES.

Journal: :Cryptologia 2003
Raphael C.-W. Phan

Impossible differential cryptanalysis is one of the cryptanalysis methods that are applicable to the new Advanced Encryption Standard (AES). In this paper, we present an introduction to the method by applying it on Mini-AES, the mini version of the AES published in Cryptologia recently.

Journal: :Electronics 2021

Nowadays, a huge amount of digital data is frequently changed among different embedded devices over wireless communication technologies. Data security considered an important parameter for avoiding information loss and preventing cyber-crimes. This research article details the low power high-speed hardware architectures efficient field programmable gate array (FPGA) implementation advanced encr...

Journal: :Vaccine 2014
Tracy Pondo Charles E Rose Stacey W Martin Wendy A Keitel Harry L Keyserling Janiine Babcock Scott Parker Robert M Jacobson Gregory A Poland Michael M McNeil

BACKGROUND Anthrax vaccine adsorbed (AVA) administered intramuscularly (IM) results in fewer adverse events (AEs) than subcutaneous (SQ) administration. Women experience more AEs than men. Antibody response, female hormones, race, and body mass index (BMI) may contribute to increased frequency of reported injection site AEs. METHODS We analyzed data from the CDC AVA human clinical trial. This...

2010
Elisa Fuentes-Montemayor Dave Goulson Kirsty J. Park

1. Agricultural intensification and expansion are regarded as major causes of worldwide declines in biodiversity during the last century. Agri-environment schemes (AES) have been introduced in many countries as an attempt to counteract the negative effects of intensive agriculture by providing financial incentives for farmers to adopt environmentally-sensitive agricultural practices. 2. We surv...

Journal: :Clinical therapeutics 2006
Sean D Young Daniel M Oppenheimer

BACKGROUND Pharmaceutical noncompliance is an increasingly important problem in the United States, leading to hundreds of thousands of deaths and billions of wasted dollars each year. Patients' fear of adverse events (AEs) is one possible reason for lack of compliance. OBJECTIVES The aims of the 3 studies described in this article were to investigate whether commonly used methods of conveying...

2016
Hyeongyu Lee Yosoon Choi Jangwon Suh Seung-Ho Lee

Understanding spatial variation of potentially toxic trace elements (PTEs) in soil is necessary to identify the proper measures for preventing soil contamination at both operating and abandoned mining areas. Many studies have been conducted worldwide to explore the spatial variation of PTEs and to create soil contamination maps using geostatistical methods. However, they generally depend only o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید