• No results found

[PDF] Top 20 On the (In)Security of IDEA in Various Hashing Modes

Has 10000 "On the (In)Security of IDEA in Various Hashing Modes" found on our website. Below are the top 20 most common "On the (In)Security of IDEA in Various Hashing Modes".

On  the (In)Security  of  IDEA  in  Various  Hashing  Modes

On the (In)Security of IDEA in Various Hashing Modes

... first obvious candidate is the null key (all bits set to zero), which will force all the subkeys to zero as well. As a consequence, all subkeys additions can be simply removed and all subkeys multiplications can be ... See full document

28

THE HASH IDEA FOR BLOCKCHAIN SECURITY

THE HASH IDEA FOR BLOCKCHAIN SECURITY

... Data Security Conventional models of data security rely on creating harder and harder “walls” – adding multiple factors to authentication for access and stronger ...Decentralized Security Underlying ... See full document

5

The Effectiveness of Health Service at the Social Security Office of the Governing Body (BPJS)  in Indonesia

The Effectiveness of Health Service at the Social Security Office of the Governing Body (BPJS) in Indonesia

... Adding tens of millions of participants national health Guarantee from business entity years 2015 feared t idak served well. This is because the distribution of doctors and healthcare facilities in the country have not ... See full document

6

DAESH IN THE PERSPECTIVE OF VARIOUS RESEARCH 
SCHOOLS

DAESH IN THE PERSPECTIVE OF VARIOUS RESEARCH SCHOOLS

... This leads to another conclusion, indicating the necessity for further research, not only dedicated to Daesh, but also focused on developing the theoretical potential of international relations. It is clear that the ... See full document

13

Improve the Integrity of Data Using Hashing Algorithms

Improve the Integrity of Data Using Hashing Algorithms

... for hashing is combination of both password+salt and is given to any desirable hashing algorithm (here MD5 and SHA-1) to generate the Salted ...common idea of making this types of attacks slower that ... See full document

6

The Impact of Drug Abuse in the Social Perspective on the Young Generation in South Sulawesi

The Impact of Drug Abuse in the Social Perspective on the Young Generation in South Sulawesi

... There is an attraction between the parties think of the importance to develop the personality of the adolescent (younger generation) became the successor of the nation and business interests of the younger generation of ... See full document

6

Modern aspects of the development of security in air transport under the conditions of air terrorism

Modern aspects of the development of security in air transport under the conditions of air terrorism

... Air transport, in economic terms, is the activity of providing payable services, which result in carrying passengers and goods by air, as well as the implementation of auxiliary services (supporting) flight operations. A ... See full document

16

The Challenges of Human Security in Sub-Saharan Africa: The Way Forward

The Challenges of Human Security in Sub-Saharan Africa: The Way Forward

... “Human Security” approach contends that threats and challenges to security transcend national defence, law and order to encompass all political, economic and social issues that guarantee a life free from ... See full document

8

THE VISEGRAD GROUP IN THE WESTERN SECURITY 
SYSTEM

THE VISEGRAD GROUP IN THE WESTERN SECURITY SYSTEM

... Despite many areas in which the V4 countries develop cooperation in energy security issues, there are also many differences regarding the common energy policy. A different policy towards the Russian Federation ... See full document

35

Empowerment of Fishing Communities in the Management of the Results of the Sea in Indonesia

Empowerment of Fishing Communities in the Management of the Results of the Sea in Indonesia

... In various fields, well-educated people always expected and demanded to be able to lead the people towards a new society, to the most ideal stage for the welfare and prosperity of its people that is wrapped with ... See full document

7

State-of-the-Art Survey on In-Vehicle Network
Communication “CAN-Bus” Security and
Vulnerabilities

State-of-the-Art Survey on In-Vehicle Network Communication “CAN-Bus” Security and Vulnerabilities

... In this part, the state-of-the-art survey is carried out to discuss different approaches and solutions that researchers have proposed to make in-vehicle communication more secure. Researchers have worked in different ... See full document

8

Review: Network Security Mechanisms and Cryptography

Review: Network Security Mechanisms and Cryptography

...  Application-level gateways (proxies) combine some of the attributes of packet-filtering firewalls with those of circuit-level gateways. They filter packets not only according to the service for which they are intended ... See full document

9

Prevalence of Intestinal Parasites in Children Living in Various Living Conditions in Slovakia

Prevalence of Intestinal Parasites in Children Living in Various Living Conditions in Slovakia

... by various authors regarding the prevalence of ascariasis and trichuriasis in children who live in various areas and in various conditions across Slovakia ...in various groups of children, ... See full document

12

The Independence of the Labour of Women in Strengthening the Economy in Indonesia

The Independence of the Labour of Women in Strengthening the Economy in Indonesia

... More specifically, women were only given access to jobs of low quality, where salary (wages) are lower. There are a variety of reasons companies do the job discrimination. First, prejudice a particular job can only be ... See full document

8

The role of various transporters in the placental uptake of ofloxacin in an in vitro model of human villous trophoblasts

The role of various transporters in the placental uptake of ofloxacin in an in vitro model of human villous trophoblasts

... The pre-incubation period of the time- and concentration- dependent cellular uptake experiments was 10 minutes. BeWo cells were pre-incubated over 30 minutes with the various substrates and inhibitors dissolved in ... See full document

10

Efficacy of various antioxidants in the protection of the retinal pigment epithelium from oxidative stress

Efficacy of various antioxidants in the protection of the retinal pigment epithelium from oxidative stress

... Figure 2 Effects of vitamin C, vitamin C phosphate, vitamin E, betaxolol, propofol, and NAC pretreatment on the viability of oxidatively stressed RPE cells. ARPE-19 cells were incubated with various concentrations ... See full document

6

An update on the use of Atripla<sup>®</sup> in the treatment of HIV in the United States

An update on the use of Atripla<sup>&reg;</sup> in the treatment of HIV in the United States

... Abstract: Atripla ® (Gilead Sciences Inc, Foster City, CA, USA and Bristol-Myers Squibb, New York City, NY, USA) is a coformulated single pill composed of efavirenz, emtricitabine, an[r] ... See full document

6

The Impact of Crisis Management on Staff Organizational Performance: In Business Firms in the Kingdom of Bahrain

The Impact of Crisis Management on Staff Organizational Performance: In Business Firms in the Kingdom of Bahrain

... Paper Title (use style paper title) Volume 4, Issue 1, January – 2019 International Journal of Innovative Science and Research Technology ISSN No 2456 2165 IJISRT19JA224 www ijisrt com 548 The Impact[.] ... See full document

5

On the Consequence of Variation Measure in K- Modes Clustering Algorithm

On the Consequence of Variation Measure in K- Modes Clustering Algorithm

... measure to the k-modes clustering process to enhance the accuracies of the clustering outputs. Their main idea is to use the relative attribute frequencies of the cluster modes in the similarity ... See full document

8

Security of Password Hashing in Cloud

Security of Password Hashing in Cloud

... current security of various password hashing schemes that are in use today will be investigated through practical proof of con- cept-GPU based, password hash dump cracking using the power of cloud ... See full document

24

Show all 10000 documents...