نتایج جستجو برای: rao nam cryptosystem

تعداد نتایج: 16923  

1999
Michael Hartmann Sachar Paulus Tsuyoshi Takagi

Recently, a new public-key cryptosystem constructed on number elds is presented. The prominent theoretical property of the public-key cryptosystem is a quadratic decryption bit complexity of the public key, which consists of only simple fast arithmetical operations. We call the cryptosystem NICE (New Ideal Coset Encryption). In this paper, we consider practical aspects of the NICE cryptosystem....

Journal: :Bulletin of Electrical Engineering and Informatics 2015

Journal: :IEICE Transactions 2011
Makoto Otani Tatsuya Hirahara

A non-audible murmur (NAM), a very weak whisper sound produced without vocal fold vibration, has been researched in the development of a silent-speech communication tool for functional speech disorders as well as human-to-human/machine interfaces with inaudible voice input. The NAM can be detected using a specially designed microphone, called a NAM microphone, attached to the neck. However, the...

Journal: :Significance 2011

Journal: :Journal of Multivariate Analysis 2005

2008
Tamer M. Barakat Amr M. Gody Amin M. Nassar

Security in the wireless sensor networks (WSNs) is based on using public-key cryptosystems such as RSA cryptosystem to achieve the authentication between wireless sensor nodes and their base station. This cryptosystem has two important problems; (i) the decryption process is slow (ii) it is insecure due to some known attacks such as common modulus attack and low exponent attack. In this paper w...

Journal: :Wireless Networks 2022

Abstract The polar code is a unique coding approach that can achieve Shannon's capacity in modern communication systems' discrete memory-less channels with superior reliability, but it not secure enough under attacks for such systems. This study aims to offer comprehensive secured scheme uses combination of and the Mersenne-Twister pseudo-random number generator (MT-PRNG) super encoding. pre-sh...

Journal: :CoRR 2013
Ayan Mahalanobis

The ElGamal cryptosystem is the most widely used public key cryptosystem. It uses the discrete logarithm problem as the cryptographic primitive. The MOR cryptosystem is a similar cryptosystem. It uses the discrete logarithm problem in the automorphism group as the cryptographic primitive. In this paper, we study the MOR cryptosystem for finite p-groups. The study is complete for p-automorphisms...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده مهندسی عمران 1392

در این مطالعه، عملکرد مدل های توزیعی و یکپارچه برای شبیه سازی بیلان آب مورد بررسی قرار گرفته است. در این راستا با استفاده از مدل توزیعی mike she و مدل یکپارچه mike nam حوضه آبریز رودخانه قره سو با مساحت حدود 4100 کیلومتر مربع واقع در استان اردبیل، شبیه سازی و بیلان آب منطقه با استفاده از مدل های ذکر شده، محاسبه گردید. به منظور اطمینان از شبیه سازی صحیح فرآیندهای هیدرولوژیکی توسط هر دو مدل، دبی ...

2015
Angelique Riepsamen Lindsay Wu Laurin Lau Dave Listijono William Ledger David Sinclair Hayden Homer

Following exit from meiosis I, mammalian oocytes immediately enter meiosis II without an intervening interphase, accompanied by rapid reassembly of a bipolar spindle that maintains condensed chromosomes in a metaphase configuration (metaphase II arrest). Here we study the effect of nicotinamide (NAM), a non-competitive pan-sirtuin inhibitor, during meiotic maturation in mouse oocytes. Sirtuins ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید