نتایج جستجو برای: key block method

تعداد نتایج: 2235566  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بوعلی سینا - دانشکده علوم پایه 1391

abstract: in this thesis, we focus to class of convex optimization problem whose objective function is given as a linear function and a convex function of a linear transformation of the decision variables and whose feasible region is a polytope. we show that there exists an optimal solution to this class of problems on a face of the constraint polytope of feasible region. based on this, we dev...

پایان نامه :دانشگاه امام رضا علیه اسلام - دانشکده ادبیات و علوم انسانی 1393

this research aims at answering the questions about translation problems and strategies applied by translators when translating cultural concepts. in order to address this issue, qualitative and quantitative study were conducted on two groups of subjects at imam reza international university of mashhad. these two groups were assigned as beginner and advanced translation students (10 students). ...

Journal: :International Journal of Computer Applications 2016

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور استان مازندران - دانشکده ریاضی 1390

abstract this thesis includes five chapter : the first chapter assign to establish fuzzy mathematics requirement and introduction of liner programming in thesis. the second chapter we introduce a multilevel linear programming problems. the third chapter we proposed interactive fuzzy programming which consists of two phases , the study termination conditions of algorithm we show a satisfac...

Journal: :Journal of Engineering and Applied Sciences 2019

Journal: :bulletin of the iranian mathematical society 2013
r. katani s. shahmorad

in this paper, we propose a new method for the numerical solution of two-dimensional linear and nonlinear volterra integral equations of the first and second kinds, which avoids from using starting values. an existence and uniqueness theorem is proved and convergence isverified by using an appropriate variety of the gronwall inequality. application of the method is demonstrated for solving the ...

2003
Chris J. Mitchell

A method for deriving a public key encryption system from any ‘conventional’ (secret key) block cipher is described. The method is related to, but improves upon, Merkle’s ’puzzle system’.

Journal: :IACR Cryptology ePrint Archive 2002
Tetsu Iwata Kaoru Kurosawa

In this paper, we present One-key CBC MAC (OMAC) and prove its security for arbitrary length messages. OMAC takes only one key, K (k bits) of a block cipher E. Previously, XCBC requires three keys, (k + 2n) bits in total, and TMAC requires two keys, (k + n) bits in total, where n denotes the block length of E. The saving of the key length makes the security proof of OMAC substantially harder th...

Journal: :IACR Cryptology ePrint Archive 2002
Gregory G. Rose Philip Hawkes

We demonstrate that the existence of distinguishing attacks against stream ciphers is unrelated to their security in practical use, and in particular that the amount of data required to perform a distinguishing attack is unrelated to the key length of the cipher. The implication for the NESSIE Project is that no submitted symmetric cipher would be accepted under the unpublished rules for distin...

1998
Johan Borst Bart Preneel Vincent Rijmen Bart Van Rompay

The block cipher CRYPTON is a candidate proposal for the AES standard. In this report we describe a class of 232 weak keys. This is mainly a consequence of the use of linear operations in the key schedule. These weak keys especially have consequences for the use of CRYPTON in certain hash function constructions.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید