نتایج جستجو برای: rao nam cryptosystem
تعداد نتایج: 16923 فیلتر نتایج به سال:
At Eurocrypt ’96, Meyer and Müller presented a new Rabin-type cryptosystem based on elliptic curves. In this paper, we will show that this cryptosystem may be reduced to the cryptosystem of Rabin-Williams.
Previously, we have shown that the window of opportunity for nicotinamide (NAM) therapy (50 mg/kg) following cortical contusion injuries (CCI) extended to 4-8 hrs post-CCI when administered over a six day post-CCI interval. The purpose of the present study was to determine if a more chronic NAM treatment protocol administered following CCI would extend the current window of opportunity for effe...
INTRODUCTION Necrotizing autoimmune myopathies (NAM) have recently been defined as a distinct group of severe acquired myopathies, characterized by prominent myofiber necrosis without significant muscle inflammation. Because of the lack of appropriate biomarkers, these diseases have been long misdiagnosed as atypical forms of myositis. NAM may be associated to autoantibodies directed against si...
In 1991, Damgård proposed a simple public-key cryptosystem that he proved CCA1-secure under the Diffie-Hellman Knowledge assumption. Only in 2006, Gjøsteen proved its CCA1-security under a more standard but still new and strong assumption. The known CCA2-secure public-key cryptosystems are considerably more complicated. We propose a hybrid variant of Damgård’s public-key cryptosystem and show t...
A recently proposed public key cryptosystem based on Chebyshev polynomials suggests a new approach to data encryption. But the security of the cryptosystem has not been investigated in depth, for lack of an appropriate analysis method. In this paper, a new representation of Chebyshev polynomial is introduced to study security issues of the cryptosystem. The properties of Chebyshev polynomial se...
We describe a public-key cryptosystem with worst-case/average case equivalence. The cryptosystem has an amortized plaintext to ciphertext expansion of O(n), relies on the hardness of the Õ(n)-unique shortest vector problem for lattices, and requires a public key of size at most O(n) bits. The new cryptosystem generalizes a conceptually simple modification of the “Ajtai-Dwork” cryptosystem. We p...
Current surgical treatment of primary melanoma is uniform for all histosubtypes, although certain types of melanoma, such as acral lentiginous melanoma (ALM), have a worse prognosis. No study has explored the effectiveness of standard melanoma treatment guidelines for managing ALM compared with nonacral melanoma (NAM). Study subjects were identified from a prospectively enrolled database of pat...
In this paper we consider estimation of the derivative of a density based on wavelets methods using randomly right censored data. We extend the results regarding the asymptotic convergence rates due to Prakasa Rao (1996) and Chaubey et al. (2008) under random censorship model. Our treatment is facilitated by results of Stute (1995) and Li (2003) that enable us in demonstrating that the same con...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید