نتایج جستجو برای: strong s domain

تعداد نتایج: 1413765  

Journal: :Bulletin of the Korean Mathematical Society 2013

Journal: :J. UCS 1996
Xian-Mo Zhang Yuliang Zheng

Two signi cant recent advances in cryptanalysis, namely the di erential attack put forward by Biham and Shamir [BS91] and the linear attack by Matsui [Mat94a, Mat94b], have had devastating impact on data encryption algorithms. An eminent problem that researchers are facing is to design S-boxes or substitution boxes so that an encryption algorithm that employs the S-boxes is immune to the attack...

1994
Jennifer Seberry Xian-Mo Zhang Yuliang Zheng

Two signi cant recent advances in cryptanalysis namely the di erential attack put forward by Biham and Shamir and the linear attack by Matsui have had devastating impact on data encryption algorithms An eminent problem that researchers are facing is to design S boxes or substitution boxes so that an encryption algorithm that em ploys the S boxes is immune to the attacks In this paper we present...

Journal: :IACR Cryptology ePrint Archive 2012
Bodhisatwa Mazumdar Debdeep Mukhopadhyay Indranil Sengupta

Abstract. In FSE 2005, transparency order was proposed as a parameter for the robustness of S-boxes to Differential Power Analysis (DPA): lower transparency order implying more resistance. However most cryptographically strong Boolean functions have been found to have high transparency order. Also it is a difficult problem to search for Boolean functions which are strong cryptographically, and ...

1994
Jennifer Seberry Xian-Mo Zhang Yuliang Zheng

Two signi cant recent advances in cryptanalysis namely the di erential attack put for ward by Biham and Shamir and the linear attack by Matsui have had devastating impact on data encryption algorithms An eminent problem that researchers are facing is to design S boxes or substitution boxes so that an encryption algorithm that employs the S boxes is immune to the attacks In this paper we present...

Journal: :I. J. Network Security 2009
Jorge Nakahara

This paper analyses all 24 possible round constructions using different combinations of the four round components of the AES cipher: SubBytes, ShiftRows, AddRoundKey and MixColumns. We investigate how the different round orderings affect the security of AES against differential, linear, multiset, impossible differential and boomerang attacks. The cryptographic strenght of each cipher variant wa...

Journal: :Int. J. Math. Mathematical Sciences 2006
Ahmed Ayache David E. Dobbs Othman Echi

If (R,M) and (S,N) are quasilocal (commutative integral) domains and f : R → S is a (unital) ring homomorphism, then f is said to be a strong local homomorphism (resp., radical local homomorphism) if f (M) = N (resp., f (M) ⊆ N and for each x ∈ N , there exists a positive integer t such that xt ∈ f (M)). It is known that if f : R→ S is a strong local homomorphism where R is a pseudovaluation do...

Bita Shalbafan Forouzan Sadeghian Javad Mohammadi-Asl, Maryam Tahmasebi Birgani, Mohammadreza Hajjari, Neda Golchin

Objective(s): Charcot-Marie Tooth disease (CMT) is one of the main inherited causes of motor and sensory neuropathies with variable expressivity and age-of onset. Although more than 70 genes have been identified for CMT, more studies are needed to discover other genes involved in CMT. Introduction of whole exome sequencing (WES) to capture all the exons may help to fin...

2014
XUECHONG GUAN YONGMING LI

In this paper, the continuity and strong continuity in domain-free information algebras and labeled information algebras are introduced respectively. A more general concept of continuous function which is defined between two domain-free continuous information algebras is presented. It is shown that, with the operations combination and focusing, the set of all continuous functions between two do...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید