• No results found

cryptanalytic techniques

ANALYZING CRYPTANALYTIC TECHNIQUES OF BLOCK CIPHERS FOR SYMMETRIC ENCRYPTION

ANALYZING CRYPTANALYTIC TECHNIQUES OF BLOCK CIPHERS FOR SYMMETRIC ENCRYPTION

... cryptanalysis techniques. Many authors have suggested different cryptanalytic techniques for Symmetric and Asymmetric Encryptions but this paper discusses the Cryptanalytic techniques ...

8

Techniques for securing the data in cloud computing

Techniques for securing the data in cloud computing

... info, cryptanalytic techniques are often wont to cipher information To cipher the client’s information at intervals the cloud, Encrypted file systems (EFS) is employed ...

5

Cryptanalysis of Block Ciphers with New Design Strategies

Cryptanalysis of Block Ciphers with New Design Strategies

... Finally, we review some of the cryptanalytic techniques that can be utilized to mount attacks on block ciphers such as differential, linear, differential-linear, higher-order differentia[r] ...

172

MoL 2013 23: 
  Reconstructing the Cryptanalytic Attack behind the Flame Malware

MoL 2013 23: Reconstructing the Cryptanalytic Attack behind the Flame Malware

... 8], techniques are introduced to detect whether a given message was constructed via a collision attack on MD5 or SHA1 based on differential cryptanalysis without knowing the precise attack algorithm and the ...

97

COMMERCIAL IN CONFIDENCE

COMMERCIAL IN CONFIDENCE

... 7.4.2 In assessing the strength requirements of cryptographic mechanisms, the evaluators shall bear in mind that an attacker may be able to take a copy of some encrypted data and store it until improved ...

46

A performance analysis of Generalized Key Scheme Block Cipher (GKSBC) algorithm to Cryptanalytic Attacks

A performance analysis of Generalized Key Scheme Block Cipher (GKSBC) algorithm to Cryptanalytic Attacks

... Block ciphers play an important role in many cryptographic and security protocols. They are used to conceal confidential information, not only during its broadcast over a public channel, but also when it is stored. The ...

5

Security to Data Access in Cloud Computing using Learning Techniques and Cryptanalytic Strategies

Security to Data Access in Cloud Computing using Learning Techniques and Cryptanalytic Strategies

... different techniques are ...RSA techniques and AES techniques [5] was used in which guarantee the security of the users’ information present on the cloud ...different techniques like KP-ABE, ...

6

Brahmi word recognition by supervised techniques

Brahmi word recognition by supervised techniques

... Some studies focused on the comparison of feature extraction techniques and classifiers to recognise Devanagari characters. For example, In contrast, the accuracy of ANN was found to be 97.15%, and SVM returned a ...

12

Clustering of Cardiovascular Disease Patients Using Data Mining Techniques with Principal Component Analysis and K-Medoids

Clustering of Cardiovascular Disease Patients Using Data Mining Techniques with Principal Component Analysis and K-Medoids

... One of the techniques contained in data mining is clustering. Clustering technique can be defined as the process of dividing a collection of data objects (observations) into a new subset so that data objects ...

12

Application of spectral angle mapping and maximum likelihood classification techniques to evaluate forest fire severity from UAV multispectral images in South Korea

Application of spectral angle mapping and maximum likelihood classification techniques to evaluate forest fire severity from UAV multispectral images in South Korea

... This study investigated the use of multispectral UAV images to assess forest fire severity. Two supervised learning techniques, Spectral angle mapper (SAM), and Maximum likelihood (ML) were used for this purpose. ...

13

Article Accuracy and Efficiency of Various GMM Inference Techniques in Dynamic Micro Panel Data Models

Article Accuracy and Efficiency of Various GMM Inference Techniques in Dynamic Micro Panel Data Models

... inference techniques on establishing instrument validity and regarding the coefficient values by standard and by corrected test ...preferred techniques for use in finite samples of particular models emerge, ...

52

Multiple Groundwater Parameters and Environmental Changes using Geospatial Techniques in the Permian Basin, Texas

Multiple Groundwater Parameters and Environmental Changes using Geospatial Techniques in the Permian Basin, Texas

... We evaluated groundwater quality parameters such as pH, TDS, chloride, fluoride, nitrate, and arsenic from 1992-2005 and 2006-2019 and identified land cover maps where specific changes in the environment effected ...

32

Supplementary Material Accuracy and efficiency of various GMM inference techniques in dynamic micro panel data models

Supplementary Material Accuracy and efficiency of various GMM inference techniques in dynamic micro panel data models

... Accuracy and efficiency of various GMM inference techniques in dynamic micro panel data models.. Jan F[r] ...

178

A Study of ZVS, ZCS and ZVZCS techniques in Reducing the Energy Loss and Improving the Soft Switching Range

A Study of ZVS, ZCS and ZVZCS techniques in Reducing the Energy Loss and Improving the Soft Switching Range

... switching techniques are being proposed [1-15], which includes the zero voltage switching (ZVS), zero current switching (ZCS) and zero voltage zero current switching ...

19

THE ROLE OF ANESTHESIOLOGIST AND SELECTION OF EFFECTIVE ANESTHESIA TECHNIQUES IN LOMBOK’S EARTHQUAKE VICTIM’S MANAGEMENT

THE ROLE OF ANESTHESIOLOGIST AND SELECTION OF EFFECTIVE ANESTHESIA TECHNIQUES IN LOMBOK’S EARTHQUAKE VICTIM’S MANAGEMENT

... anesthesia techniques must be based on the existing conditions and ...airways techniques chosen for patients, the more anesthesiologists need to stand by for the patient during ...

13

A LEARNING BASED FRAMEWORK FOR DETECTION OF ANDROID C&C ENABLED APPLICATIONS USING HYBRID ANALYSIS Attia Qamar 1, Ahmad Karim2 , Shahaboddin Shamshirband 3,4

A LEARNING BASED FRAMEWORK FOR DETECTION OF ANDROID C&C ENABLED APPLICATIONS USING HYBRID ANALYSIS Attia Qamar 1, Ahmad Karim2 , Shahaboddin Shamshirband 3,4

... Machine learning techniques are used to classify malware binaries from benign to conduct results with the lowest error rate. In this study, we consider four renowned Ml classifiers i.e. Random Forest, Naïve Bayes, ...

17

Satellite and Ground Remote Sensing Techniques to Trace the Hidden Growth of a Lava Flow Field: The 2014-15 Effusive Eruption at Fogo Volcano (Cape Verde)

Satellite and Ground Remote Sensing Techniques to Trace the Hidden Growth of a Lava Flow Field: The 2014-15 Effusive Eruption at Fogo Volcano (Cape Verde)

... Keywords: Remote sensing monitoring, Fogo volcano, effusive eruption, lava flow inflation, lava tubes, time averaged effusion rate (TADR), magma supply rate (SR).. Running Title: Lava[r] ...

39

Fast and Effective Techniques for LWIR Radiative Transfer Modeling: A Dimension Reduction Approach

Fast and Effective Techniques for LWIR Radiative Transfer Modeling: A Dimension Reduction Approach

... In the majority of the classification research discussed thus far, the approach is typically trained and tested using benchmark hyperspectral data sets such as Kennedy Space Center, Indian Pines and Pavia University [7]. ...

22

Search | Preprints

Search | Preprints

... Effects of different techniques of malolactic fermentation induction on diacetyl metabolism and biosynthesis of selected aromatic esters in cool-climate grape wines1. Małgorzata Lasik-K[r] ...

15

Bombay Red Onion (Allium cepal L.) Basic

Bombay Red Onion (Allium cepal L.) Basic

... drying method had significant effect on onion physicochemical quality attributes at (P < 0.05) as.. 25.[r] ...

8

Show all 10000 documents...

Related subjects