搜索结果: 1-15 共查到“counter”相关记录76条 . 查询时间(0.062 秒)
安徽三联学院外语学院外贸函电课件Unit 3 offer and counter offer
安徽三联学院外语学院 外贸函电 课件 Unit 3 offer and counter offer
2019/4/28
安徽三联学院外语学院外贸函电课件Unit 3 offer and counter offer。
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
Verifiable Computing Smart Contract Game Theory
2018/5/28
Cloud computing has become an irreversible trend. Together comes the pressing need for verifiability, to assure the client the correctness of computation outsourced to the cloud. Existing verifiable c...
The Missing Difference Problem, and its Applications to Counter Mode Encryption
Modes of operation CTR GCM
2018/3/7
To achieve this result, we study a simple algorithmic problem related to the security of the CTR mode: the missing difference problem. We give efficient algorithms for this problem in two practically ...
Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode)
cryptanalysis time-memory tradeoff attacks block ciphers
2018/2/3
In this paper, we consider the implications of parallelizing time-memory tradeoff attacks using a large number of distributed processors. It is shown that Hellman’s original tradeoff method and the Bi...
Mathematical modeling of heat transfer in counter-current multiphase flow found in gas-drilling systems with formation fluid influx
Gas-drilling Temperature Prediction Influx Joule–Thomson Cuttings
2018/4/2
The performance of gas-drilling (drilling oil and gas wells with air, nitrogen, or natural gas) is very unpredictable in many areas due to lack of proper design of drilling parameters because of limit...
山东财经大学国际商务函电课件unit 4 Offers and Counter-offers
山东财经大学 国际商务函电 课件 unit 4 Offers and Counter-offers
2016/11/29
山东财经大学国际商务函电课件unit 4 Offers and Counter-offers。
武汉科技学院外国语学院外贸英语函电课件Unit5 Counter-Offer&Orders
武汉科技学院外国语学院 外贸英语函电 课件 Unit5 Counter-Offer&Orders
2016/4/7
武汉科技学院外国语学院外贸英语函电课件Unit5 Counter-Offer&Orders.
Comparing American and European Regulation of Over-the- Counter Derivative Securities
Centralized Clearing Dodd-Frank EMIR OTC Derivatives Regulation
2016/1/27
This paper describes the major issues in the clearing of over-the-counter (OTC) derivatives and the current regulative initiatives aimed at removing the market opaqueness. The core of the paper is the...
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function
Streebog cryptanalysis second-preimage attack
2016/1/7
Streebog is a new Russian hash function standard. It follows the HAIFA framework as domain extension algorithm and claims to resist recent generic second-preimage attacks with long messages. However, ...
Authentication Key Recovery in Galois/Counter Mode (GCM)
Secret-key Cryptography Message Authentication Codes Block Ciphers
2015/12/30
GCM is used in a vast amount of security protocols and is quickly becoming the de facto mode of operation for block ciphers. In this paper we suggest several novel improvements to Fergusons’s authenti...
Complementary Dual Codes for Counter-measures to Side-Channel Attacks
Counter-measures Side-Channel Attacks
2015/12/29
We recall why linear codes with complementary duals (LCD codes) play a role in counter-measures to passive and active side-channel analyses on embedded cryptosystems. The rate and the minimum distance...
Using State Space Encoding To Counter Biased Fault Attacks on AES Countermeasures
Cryptanalysis Time Redundancy Biased Faults
2015/12/24
Biased fault attacks such as the Differential Fault
Intensity Analysis (DFIA) have been a major threat to cryptosystems
in recent times. DFIA combines principles of side
channel analysis and fault ...
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
authenticated encryption tweakable block cipher nonce-misuse resistance
2015/12/21
We propose the Synthetic Counter-in-Tweak (SCT) mode,
which turns a tweakable block cipher into a nonce-based authenticated
encryption scheme (with associated data). The SCT mode combines in
a SIV-...
Counter Braids: Asymptotic Optimality of the Message Passing Decoding Algorithm
Counter structure braids high-speed link counter braid
2015/8/21
A novel counter architecture, called Counter Braids, has recently been proposed for per-flow counting on high-speed links. Counter Braids has a layered structure and compresses the flow si...
Counter Braids: A Novel Counter Architecture for Per-Flow Measurement
Statistics Counters Network Measurement Message Pass- ing Algorithms
2015/8/21
Fine-grained network measurement requires routers and switches to update large arrays of counters at very high link speed (e.g. 40 Gbps). A naive algorithm needs an infeasible amount of SRAM to store ...