نتایج جستجو برای: known

تعداد نتایج: 720885  

Journal: :International Journal of Mental Health and Addiction 2021

Abstract Exercise addiction (EA) involves excessive concerns for exercise routines, an abusive practice, and the inability to control one’s own behavior, as well presence of psychological processes that are typical behavioral addictions such abstinence. EA is further associated with alteration individual’s personal, social, professional functioning a higher risk several pathologies, including p...

Journal: :Cryptologia 2016
George Lasry Nils Kopal Arno Wacker

The Hagelin M-209 portable encryption device was used by the US Army in World War II and the Korean War, as well as by other armies and in embassy settings. In this paper, we present a fully automated computerized known-plaintext attack, based on hillclimbing and a novel fitness function – the Aggregate Displacement Error. In our performance evaluation we show that we are able to recover key se...

Journal: :IACR Cryptology ePrint Archive 2012
Martin Stanek

Scrambled Burrows-Wheeler transform [6] is an attempt to combine privacy (encryption) and data compression. We show that the proposed approach is insecure. We present chosen plaintext and known plaintext attacks and estimate their complexity in various scenarios.

2014
Rebecca A. Dore Angeline S. Lillard Vikram K. Jaswal

Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opin...

2002
JAN BOUDA

We extensively discuss the problem of encryption of quantum information. We present an attack on the private quantum channel which applies when partial classical description of the cipher text is known (the known-ciphertext attack) and show how to avoid this situation. The quantum analogue of the known-plaintext attack is also discussed.

2009
JWR May Gheorghe Craciun

These notes are shamelessly cribbed from the extremely helpful online notes [2]. Even most of the notation is the same. I wrote them because, like Goethe’s Frenchman, I wanted to translate Gunawardena’s notes into my own language. I also benefitted from conversations with Moe Hirsch and Gheorghe Craciun and from lectures by Gheorghe Craciun and David Anderson. 1. Notation. The positive real num...

Journal: :Image Vision Comput. 2007
Chengqing Li Shujun Li Muhammad Asim Juana Nunez Gonzalo Álvarez Guanrong Chen

This paper studies the security of a recently-proposed chaos-based image encryption scheme, and points out the following problems: 1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; 2) given one chosen plain-image, a subkey K10 can be guessed with a smaller computational complexity than that of the simple brute-force attack; ...

2006
Mikhail G. Stepanov Sergey Bezzateev Tae-Chul Jung

The idea of privacy homomorphism (PH) was firstly introduced by Rivest, Adleman and Dertouzos [1]. They proposed several PHs to process encrypted data without decrypting. A PH is an encryption function which allows the processing the encrypted data without decryption. Formally privacy homomorphism can be defined as an encryption function e which has efficient algorithms to compute e (xy) and e ...

2012
Stephen Tyndall

This paper presents the problem within Hittite and Ancient Near Eastern studies of fragmented and damaged cuneiform texts, and proposes to use well-known text classification metrics, in combination with some facts about the structure of Hittite-language cuneiform texts, to help classify a number of fragments of clay cuneiform-script tablets into more complete texts. In particular, I propose usi...

2012
Sandra Kauffmann-Weiss Sven Hamann Markus Ernst Gruner Jörg Buschbeck Alfred Ludwig Ludwig Schultz Sebastian Fähler

The magnetic shape memory (MSM) alloy Fe70Pd30 is of particular interest for novel microactuator and sensor applications. This review summarizes the underlying physical and material science concepts for this MSM alloy system. First-principles calculations of the electronic and crystallographic structure together with combinatorial and epitaxial film studies are presented. By these complementary...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید