نتایج جستجو برای: guess and determine attack
تعداد نتایج: 16846896 فیلتر نتایج به سال:
Maelstrom-0 is the second member of a family of AES-based hash functions whose designs are pioneered by Paulo Baretto and Vincent Rijmen. According to its designers, the function is designed to be an evolutionary lightweight alternative to the ISO standard Whirlpool. In this paper, we study the preimage resistance of the Maelstrom-0 hash function using its proposed 3CM chaining construction. Mo...
In this work, we improved Correlation Power Analysis (CPA) attack against Digital Signature Algorithm (DSA) and its various derivations, such as Elliptic Curve Digital Signature Algorithm (ECDSA). The attack is aimed against integer multiplication with constant secret operand. We demonstrate this improvement on 16-bit integer multiplier in FPGA. The improvement makes it possible to guess more b...
the purpose of this study is to describe and determine the relationship between relationship marketing, customer satisfaction and intention to revisited in mashhad’s women aerobics clubs. to do this,300 randomly customers from women aerobic clubs were chosen and data was collected through kim relationship marketing questionnaire(2008) and ?=0.92, lim satisfaction questionnaire(2008) and ?=0...
the space now known as complete erdos space ec was introduced by paul erdos in 1940 as the closed subspace of the hilbert space ?2 consisting of all vectors such that every coordinate is in the convergent sequence {0} ? { 1 n : n ? n}. in a solution to a problem posed by lex g. oversteegen we present simple and useful topological characterizations of ec. as an application we determine the ...
abstract part one: the electrode oxidation potentials of a series of eighteen n-hydroxy compounds in aqueous solution were calculated based on a proper thermodynamic cycle. the dft method at the level of b3lyp-6-31g(d,p) was used to calculate the gas-phase free energy differences ,and the polarizable continuum model (pcm) was applied to describe the solvent and its interaction with n-hydroxy ...
The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over-the-air communication. While almost all of the WLAN (Wireless LAN) cards and the APs (Access Points) support WEP, a serious key recovery attack (aka FMS attack) was identified by Fluhrer et al. The FMS attack can basically be prevented by skipping IVs (Initial Values) used in the attack, but naive ...
for any educational program to be successful, many factors work hand in hand. based on pervious efl studies, teachers and learners are the keys to gain achievement. granted the fact that explicit and implicit practice plays a key role in education, knowledge of it can help teachers facilitate students’ vocabulary learning. this study investigated to determine the contribution of explicit and i...
abstract nowadays, the science of decision making has been paid to more attention due to the complexity of the problems of suppliers selection. as known, one of the efficient tools in economic and human resources development is the extension of communication networks in developing countries. so, the proper selection of suppliers of tc equipments is of concern very much. in this study, a ...
educational researchers have provided evidence that teachers’ emotional intelligence has strong effects on various aspects of teaching and learning. yet, in the field of teaching english to speakers of other languages (tesol), inquiry into teachers’ emotional intelligence is nearly limited. given its documented powerful impact on teaching practices and student learning, it is critical to pursue...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید