نتایج جستجو برای: attack resistance
تعداد نتایج: 452323 فیلتر نتایج به سال:
Biham and Chen proposed an attack on SHA-0 at Crypt 2004. In this paper, we apply the Biham-Chen attack to analyze SHAlike hash functions regarding pseudo-collision resistance and pseudorandomness. We present a scenario about how to attack SHA-like hash functions applying the Biham and Chen attack. Using this scenario, we present a differential attack on the MD5 hash function and a differential...
Resistance to DSCG in acute asthma is greater therefore, than to salbutamol. However, clinical observation suggests that resistance to beta-2 stimulants does also increase with severity of the attack. It would appear probable that only when severity exceeds the point at which measurements can be made with a peak flow meter does resistance to salbutamol become pronounced. Although placebo effect...
Abstract. The Zémor-Tillich hash function has remained unbroken since its introduction at CRYPTO’94. We present the first generic collision and preimage attacks against this function, in the sense that the attacks work for any parameters of the function. Their complexity is the cubic root of the birthday bound; for the parameters initially suggested by Tillich and Zémor they are very close to b...
fire blight, caused by the bacterium erwinia amylovora, is one of the most destructive diseases of plants in the rosaceae subfamily pomoideae. the objective of this study was to determine the level of resistance of 30 pear cultivars and describe the biochemical changes induced in some resistant and susceptible cultivars. the level of resistance was determined by the length of the fire blight le...
Resistance to DSCG in acute asthma is greater therefore, than to salbutamol. However, clinical observation suggests that resistance to beta-2 stimulants does also increase with severity of the attack. It would appear probable that only when severity exceeds the point at which measurements can be made with a peak flow meter does resistance to salbutamol become pronounced. Although placebo effect...
The objective of this work was to investigate the resistance of three Indonesian wood species to termite attack. Samples from sengon (Falcataria moluccana), mangium (Acacia mangium), and pine (Pinus merkusii) were treated with polystyrene at loading levels of 26.0%, 8.6%, and 7.7%, respectively. Treated and untreated samples were exposed to environmental conditions in the field for 3 months. Un...
Knudsen and Preneel (Asiacrypt’96 and Crypto’97) introduced a hash function design in which a linear error-correcting code is used to build a wide-pipe compression function from underlying blockciphers operating in Davies-Meyer mode. In this paper, we (re)analyse the preimage resistance of the Knudsen-Preneel compression functions in the setting of public random functions. We give a new non-ada...
Today’s computer systems face sophisticated intrusions during which multiple vulnerabilities can be combined for reaching an attack goal. The overall security of a network system cannot simply be determined based on the number of vulnerabilities. To quantitatively assess the security of networked systems, one must first understand which and how vulnerabilities can be combined for an attack. Suc...
corrosion makes huge economic and ecologic damage all over the world. biologic corrosion of sewer pipes is considered as a serious limitation in economic perspectives. to prevent biologic corrosive damage, lining techniques can be applied by materials and aggregate resistant to attack bacterially in sewer pipes. the role of bacteria is that they convert sulfur compounds into sulfuric acid which...
radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید