نتایج جستجو برای: 16 weaknesses
تعداد نتایج: 353592 فیلتر نتایج به سال:
Password-based key derivation functions are of particular interest in cryptography because they (a) input a password/passphrase (which usually is short and lacks enough entropy) and derive a cryptographic key; (b) slow down brute force and dictionary attacks as much as possible. In PKCS#5 [19], RSA Laboratories described a password based key derivation function called PBKDF2 that has been widel...
This study examines how the gender of CEOs affects internal controls over financial reporting. According to upper echelon theory, managers’ demographics can determine choices strategies. Prior literature documents characteristics relevant controls, such as CEO’s age, entrenchment (Lin, Wang, Chiou, & Huang, 2014), and experience (Oradi, Asiaei, Rezaee, 2020); however, impact on has not been...
Synchronous stream cipher HENKOS is proposed by Marius Oliver Gheorghit to eprint for analyzing the algorithm by cryptologic community. At the first look of HENKOS, it can be observed that a 256 byte secret key is an undesirable quality of the algorithm. Also, the algorithm is not efficient in case of streaming data that has to encrypt instantaneously, this is because the algorithm generates a ...
We investigate known security flaws in the context of security ceremonies to gain an understanding of the ceremony analysis process. The term security ceremonies is used to describe a system of protocols and humans which interact for a specific purpose. Security ceremonies and ceremony analysis is an area of research in its infancy, and we explore the basic principles involved to better underst...
Platt’s 1964 paper “Strong Inference” (SI), published in Science, has had considerable influence upon the conception of the nature of the scientific method held in both the social and physical sciences. Platt suggests that a four-step method of specifying hypotheses and conducting critical experiments that systematically eliminate alternatives has been responsible for progress in the history of...
the aim of this study was strategic pathology of sport and youth general office of kermanshah province in sport based on swot model. in this descriptive survey, the statistical population included managers, deputies, staff of sport and youth offices and presidents and vice-presidents of sports associations (n=186). the statistical sample was equal to population (census sampling method) but 150 ...
The lightweight block cipher PRIDE designed by Albrecht et al., appears in CRYPTO 2014. The designers claim that their method of constructing linear layer is good both in security and efficiency. In this paper, we find 16 different 2-round iterative characteristics utilizing the weaknesses of S-box and linear layer, construct several 15-round differentials. Based on one of the differentials, we...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید