Search Results - "relative key"
-
1
-
2
New key expansion function of rijndael 128-bit resistance to the related-key attacks
Published 2018“…However, a few studies on cryptanalysis revealed that a security weakness of Rijndael refers to its vulnerability to related-key differential attack as well as the related-key boomerang attack, which is mainly caused by the lack of nonlinearity in the key schedule of Rijndael. …”
Get full text
Get full text
-
3
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…In relation to this, a new theoretical attack such as related-key differential cryptanalysis (RDC) could give rise to a more practical technique. …”
Get full text
Get full text
-
4
New Key Expansion Function of Rijndael 128-Bit Resistance to The Related-Key Attacks
Published 2018“…However, a few studies on cryptanalysis revealed that a security weakness of Rijndael refers to its vulnerability to related-key differential attack as well as the related-key boomerang attack, which is mainly caused by the lack of nonlinearity in the key schedule of Rijndael. …”
Get full text
-
5
Improved security of Rijndael key expansion function
Published 2017“…Some cryptanalysis studies have also revealed a security weakness of Rijndael such as its vulnerability to related-key differential attacks and the related-key boomerang attack. …”
Get full text
Get full text
-
6
Recent Progress on Advanced Materials for Solid-Oxide Fuel Cells Operating Below 500 °C
Published 2017“…Recent advances in materials and related key components for SOFCs operating at ˜500 °C are summarized here, with a focus on the materials, structures, and techniques development for low-temperature SOFCs, including the analysis of most of the critical parameters affecting the electrochemical performance of the electrolyte, anode, and cathode. …”
Get full text
-
7
Cryptanalysis Of The Advanced Encription Standard & Skip Jack
Published 2002“…We present the reasons behind the need for cryptanalysis and then move to discuss the popular cryptanalysis method namely differential cryptanalysis, linear cryptanalysis, related-key cryptanalysis and truncated differential cryptanalysis upon which many new cryptanalysis method are based. …”
Get full text
-
8
Cryptanalysis Of The Advanced Encription Standard & Skip Jack
Published 2002“…We present the reasons behind the need for cryptanalysis and then move to discuss the popular cryptanalysis method namely differential cryptanalysis, linear cryptanalysis, related-key cryptanalysis and truncated differential cryptanalysis upon which many new cryptanalysis method are based. …”
Get full text
-
9
Void of Power
Published 2018“…It offers moments of reflection and a shift in research focus in terms of how the void is used today to express and support present power relations. Key Words: Fascism, Power, Rome, Urban Transformations, Void.…”
Get full text
-
10
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…However, cryptanalysts have revealed the security weaknesses of Rijndael in terms of its vulnerability to related-key differential and linear attacks that are mainly caused by lack of nonlinearity in its key schedule. …”
Get full text
Get full text
-
11
Language, gender and sexuality
Published 2018“…This chapter reviews early research that looked for differences between women’s and men’s language use, before turning to social-constructionist perspectives based on Butler’s model of performativity. Related key theoretical advances are explored, including Ochs’s theory of indexicality, Eckert and McConnell-Ginet’s concept of the Community of Practice, and Sunderland’s notion of gendered discourses. …”
Get full text
-
12
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits
Published 2017“…Several studies have shown a theoretical attack exploiting the AES key expansion algorithm which allows significant reduction in the complexity time to break the cipher, compared to the brute force attack. The arrack in the related-key model and the long biclique with a meet in the middle attacks in the secret-key model are applied on the AES because of the weak key expansion function. …”
Get full text
Get full text
-
13
How highway landscape visual qualities are being studied: a systematic literature review
Published 2024“…The results of the study focused on multiple perspectives of highway landscape views, viewers’ perspectives and the diversity of highway landscape purposes, viewers’ preferences for highway landscapes, the approach to preferences, and related key variables. This background knowledge deepens the understanding of visual preferences for highway landscapes and helps refine the selection of perceptual variables, establishing an essential reference criterion for professionals.…”
Get full text
Get full text
-
14
Modeling the human centered design through HCI capability / Rogayah Abdul Majid
Published 2016“…The HCD Adoption Model prescribes five levels of adoption and the related key processes of each level. This new adoption model later verified through expert reviews with two HCI academic experts and five software development practitioners in the last phase. …”
Get full text
-
15
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…Researches have suggested that sub-keys should be generated separately to avoid related-key attack. Similarly, the key space should be disproportionately large to resist any attack on the secret key. …”
Get full text
Get full text
Get full text
Get full text
-
16
U.S. relations with central Asian states: A study with reference to energy resources geopolitics from 1991 to 2012 / Hujjathullah M.H. Babu Sahib
Published 2018“…Methodologically, by merely using printed and electronic materials available in the public domain, a number of pertinent variables are considered as likely causes for the development and evolution of these relations. Key among these is the importance of the region’s energy resources to the U.S. and by extension to the western countries and their other relatively energy-deficient allies. …”
Get full text
Get full text
Get full text
-
17
A genre analysis of review articles in applied linguistics / Ali Sorayyaei Azar
Published 2017“…To this end, the data were drawn from a randomly selected corpus of thirty-two review articles, published between 2000- 2007, from a discipline-related key journal in applied linguistics. Using both qualitative and quantitative approaches, the corpus was firstly described and classified into the three types of review articles namely (a) critical evaluative review article, (b) bibliographic review article, and (c) mixed-mode review article. …”
Get full text
Get full text
Get full text