نتایج جستجو برای: attack resistance

تعداد نتایج: 452323  

2005
Hirotaka Yoshida Alex Biryukov Bart Preneel

Biham and Chen proposed an attack on SHA-0 at Crypt 2004. In this paper, we apply the Biham-Chen attack to analyze SHAlike hash functions regarding pseudo-collision resistance and pseudorandomness. We present a scenario about how to attack SHA-like hash functions applying the Biham and Chen attack. Using this scenario, we present a differential attack on the MD5 hash function and a differential...

2006
P PHUAPRADIT A NARANG P MENDONCA D A HARRIS J D BAUM

Resistance to DSCG in acute asthma is greater therefore, than to salbutamol. However, clinical observation suggests that resistance to beta-2 stimulants does also increase with severity of the attack. It would appear probable that only when severity exceeds the point at which measurements can be made with a peak flow meter does resistance to salbutamol become pronounced. Although placebo effect...

2009
Christophe Petit Jean-Jacques Quisquater Jean-Pierre Tillich Gilles Zémor

Abstract. The Zémor-Tillich hash function has remained unbroken since its introduction at CRYPTO’94. We present the first generic collision and preimage attacks against this function, in the sense that the attacks work for any parameters of the function. Their complexity is the cubic root of the birthday bound; for the parameters initially suggested by Tillich and Zémor they are very close to b...

Journal: :علوم باغبانی ایران 0
علی عبادی استاد پردیس کشاورزی و منابع طبیعی دانشگاه تهران جواد عرفانی دانشیار پردیس کشاورزی و منابع طبیعی دانشگاه تهران حمید عبدالهی دانشجوی سابق دکتری پردیس کشاورزی و منابع طبیعی دانشگاه تهران و استادیار دانشگاه ایلام محمد رضا فتاحی مقدم دانشیار بخش باغبانی مؤسسة تحقیقات اصلاح و تهیة نهال و بذر کرج

fire blight, caused by the bacterium erwinia amylovora, is one of the most destructive diseases of plants in the rosaceae subfamily pomoideae. the objective of this study was to determine the level of resistance of 30 pear cultivars and describe the biochemical changes induced in some resistant and susceptible cultivars. the level of resistance was determined by the length of the fire blight le...

Journal: :Archives of disease in childhood 1981
P Phuapradit A Narang P Mendonca D A Harris J D Baum

Resistance to DSCG in acute asthma is greater therefore, than to salbutamol. However, clinical observation suggests that resistance to beta-2 stimulants does also increase with severity of the attack. It would appear probable that only when severity exceeds the point at which measurements can be made with a peak flow meter does resistance to salbutamol become pronounced. Although placebo effect...

2016
Yusuf Sudo Hadi Muh Yusram Massijaya A. Arinana

The objective of this work was to investigate the resistance of three Indonesian wood species to termite attack. Samples from sengon (Falcataria moluccana), mangium (Acacia mangium), and pine (Pinus merkusii) were treated with polystyrene at loading levels of 26.0%, 8.6%, and 7.7%, respectively. Treated and untreated samples were exposed to environmental conditions in the field for 3 months. Un...

2010
Onur Özen Thomas Shrimpton Martijn Stam

Knudsen and Preneel (Asiacrypt’96 and Crypto’97) introduced a hash function design in which a linear error-correcting code is used to build a wide-pipe compression function from underlying blockciphers operating in Davies-Meyer mode. In this paper, we (re)analyse the preimage resistance of the Knudsen-Preneel compression functions in the setting of public random functions. We give a new non-ada...

2007
Lingyu Wang Anoop Singhal Sushil Jajodia

Today’s computer systems face sophisticated intrusions during which multiple vulnerabilities can be combined for reaching an attack goal. The overall security of a network system cannot simply be determined based on the number of vulnerabilities. To quantitatively assess the security of networked systems, one must first understand which and how vulnerabilities can be combined for an attack. Suc...

Journal: :international journal of environmental research 0
m. pazoki faculty of environment, university of tehran, iran m. a. abdoli faculty of environment, university of tehran, iran r. ghasemzade faculty of environment, university of tehran, iran p. dalaei faculty of environment, university of tehran, iran m. ahmadi pari faculty of environment, university of tehran, iran

corrosion makes huge economic and ecologic damage all over the world. biologic corrosion of sewer pipes is considered as a serious limitation in economic perspectives. to prevent biologic corrosive damage, lining techniques can be applied by materials and aggregate resistant to attack bacterially in sewer pipes. the role of bacteria is that they convert sulfur compounds into sulfuric acid which...

Journal: :isecure, the isc international journal of information security 0
s. sajjadi ghaemmaghami department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran a. haghbin department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran m. mirmohseni department of electrical engineering, sharif university of technology, tehran, iran

radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید