نتایج جستجو برای: 16 weaknesses

تعداد نتایج: 353592  

2015
Andrea Visconti Simone Bossi Hany Ragab Alexandro Calò

Password-based key derivation functions are of particular interest in cryptography because they (a) input a password/passphrase (which usually is short and lacks enough entropy) and derive a cryptographic key; (b) slow down brute force and dictionary attacks as much as possible. In PKCS#5 [19], RSA Laboratories described a password based key derivation function called PBKDF2 that has been widel...

Journal: :SIAM Journal on Computing 1997

Journal: :Corporate Governance and Sustainability Review 2022

This study examines how the gender of CEOs affects internal controls over financial reporting. According to upper echelon theory, managers’ demographics can determine choices strategies. Prior literature documents characteristics relevant controls, such as CEO’s age, entrenchment (Lin, Wang, Chiou, & Huang, 2014), and experience (Oradi, Asiaei, Rezaee, 2020); however, impact on has not been...

Journal: :IACR Cryptology ePrint Archive 2008
Prasanth Kumar Thandra S. A. V. Satya Murty R. Balasubramanian

Synchronous stream cipher HENKOS is proposed by Marius Oliver Gheorghit to eprint for analyzing the algorithm by cryptologic community. At the first look of HENKOS, it can be observed that a 256 byte secret key is an undesirable quality of the algorithm. Also, the algorithm is not efficient in case of streaming data that has to encrypt instantaneously, this is because the algorithm generates a ...

2011
Kenneth Radke Colin Boyd Juan Manuel González Nieto Margot Brereton

We investigate known security flaws in the context of security ceremonies to gain an understanding of the ceremony analysis process. The term security ceremonies is used to describe a system of protocols and humans which interact for a specific purpose. Security ceremonies and ceremony analysis is an area of research in its infancy, and we explore the basic principles involved to better underst...

2001
William O’Donohue Jeffrey A. Buchanan

Platt’s 1964 paper “Strong Inference” (SI), published in Science, has had considerable influence upon the conception of the nature of the scientific method held in both the social and physical sciences. Platt suggests that a four-step method of specifying hypotheses and conducting critical experiments that systematically eliminate alternatives has been responsible for progress in the history of...

Journal: :مدیریت ورزشی 0
همایون عباسی استادیار مدیریت ورزشی، دانشکده تربیت بدنی و علوم ورزشی، دانشگاه رازی کرمانشاه، ایران سعید خانمرادی دانشجوی کارشناسی ارشد مدیریت ورزشی، دانشکدۀ علوم ورزشی، دانشگاه رازی، کرمانشاه، ایران حسین عیدی استادیار مدیریت ورزشی، دانشکده تربیت بدنی و علوم ورزشی، دانشگاه رازی کرمانشاه، ایران

the aim of this study was strategic pathology of sport and youth general office of kermanshah province in sport based on swot model. in this descriptive survey, the statistical population included managers, deputies, staff of sport and youth offices and presidents and vice-presidents of sports associations (n=186). the statistical sample was equal to population (census sampling method) but 150 ...

Journal: :IACR Cryptology ePrint Archive 2014
Jingyuan Zhao Xiaoyun Wang Meiqin Wang Xiaoyang Dong

The lightweight block cipher PRIDE designed by Albrecht et al., appears in CRYPTO 2014. The designers claim that their method of constructing linear layer is good both in security and efficiency. In this paper, we find 16 different 2-round iterative characteristics utilizing the weaknesses of S-box and linear layer, construct several 15-round differentials. Based on one of the differentials, we...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید