Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Issue Info: 
  • Year: 

    2011
  • Volume: 

    1
  • Issue: 

    2
  • Pages: 

    25-31
Measures: 
  • Citations: 

    0
  • Views: 

    1044
  • Downloads: 

    0
Abstract: 

Modular Addition modulo 2t is one of the most applicable operators in symmetric cryptography Therefore, investigating the properties of this operator has a significant role in design and analysis of symmetric ciphers. Algebraic properties of this operator have been studied for two operands in [1]. In this contribution, to obtain more accurate results in this area, we generalize some of the algebraic properties of this operator for r ³ 2 operands. More precisely, we consider the algebraic degree of the component Boolean functions of Modular Addition as a vectorial Boolean function and determine the number of terms and variables in these Boolean functions. After some theoretical analysis in special cases, we propose an efficient algorithm for finding the degree of these Boolean functions general case. Using this algorithm, the algebraic degree of the component Boolean functions for Modular Addition modulo 232, with three up to eight operands is calculated.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1044

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2021
  • Volume: 

    9
  • Issue: 

    1 (33)
  • Pages: 

    91-100
Measures: 
  • Citations: 

    0
  • Views: 

    311
  • Downloads: 

    0
Abstract: 

A cryptographic hash function maps an arbitrary length input to a fixed length output. These functions are used in many cryptographic applications such as digital signatures. They must be secure against collision, preimage and 2-preimage attacks. Rotational cryptanalysis is an approach to the analysis of ARX ciphers. The Hash functions Shabal and Cubehash, which are two candidates of the second round of the SHA-3 competition, have an ARX structure. They have been analyzed with respect to rotational cryptanalysis by Tabatabaei et al. In this paper we consider their analysis and present some observations. Our observations show that the results of Tabatabaei et al. ’ s cryptanalysis are not accurate. Then we present some new results about rotational cryptanalysis of Shabal and Cubehash. Thereafter we present some new results and show that rotational cryptanalysis is effective on a smaller number of rounds on Shabal and Cubehash Hash functions.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 311

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2018
  • Volume: 

    6
  • Issue: 

    3 (23)
  • Pages: 

    59-64
Measures: 
  • Citations: 

    0
  • Views: 

    605
  • Downloads: 

    0
Abstract: 

Hash functions have a very important role in network and telecommunication security. These functions play an important role in hashing a message which are widely used in cryptographic applications such as digital signatures, random number generator algorithms, authentication protocols, and so on. Rotational cryptanalysis is a relatively new attack that is part of a generic attack on hash functions and is effective on algorithms that have an ARX structure. In this paper, for the first time, we apply a rotational cryptanalysis and with the given assumption of the markov chain for the Modular Additions sequence employed in two algorithms Shabal and CubeHash, which are second-round candidates for the SHA-3 competition that use the ARX property in their structure. With the implementation of rotational cryptanalysis we arrived at the complexity of 2-3393. 58 for the entire 16+3-rounds Shabal algorithm and the complexity of 2-57. 6 for the en-tire 16-round CubeHash algorithm. According to the obtained results, it can be seen that due to the large number of Modular Additions with the given assumption of markov chain, the Shabal algorithm exhibits greater resistance to rotational cryptanalysis, compared to the CubeHash algorithm and is less likely to succeed.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 605

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

REZAI A. | KESHAVARZI P.

Issue Info: 
  • Year: 

    2012
  • Volume: 

    7
  • Issue: 

    3
  • Pages: 

    240-247
Measures: 
  • Citations: 

    1
  • Views: 

    146
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 146

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

MONTGOMERY P.L.

Issue Info: 
  • Year: 

    1985
  • Volume: 

    44
  • Issue: 

    -
  • Pages: 

    519-521
Measures: 
  • Citations: 

    1
  • Views: 

    215
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 215

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Writer: 

Hekmati Sh. | ZANDI SH.

Issue Info: 
  • Year: 

    1998
  • Volume: 

    3
Measures: 
  • Views: 

    108
  • Downloads: 

    0
Abstract: 

AN IMPORTANT FACTOR IN TERMINAL DESIGNING IS TO CREATE A BALANCE BETWEEN THE INTERNAL RELATIONAL CAPABILITIES OF DIFFERENT COASTAL PARTS, THE CARGO TRANSPORTATION PROCEDURE FROM THE SHIP TO THE BERTH, THE RETENTION YARD, THE EXIT GATE AND FINALLY TO THE DOMESTIC TRANSPORTATION NETWORK. HOWEVER, DIFFERENT FACTORS SUCH AS DISCREPANCY BETWEEN LAND AND MARITIME TRANSPORTATION CAPABILITY, THE NEED OF CARGO STORAGE AND THE CENTRALIZATION OF COMMERCIAL PORTS, NECESSITATES THE NEED OF DESIGNING OF SOME AREAS AT BERTHS IN ORDER TO MAINTAIN THE CARGO. IN ORDER TO INCREASE THE EFFICIENCY OF THIS AREA AND TO DECREASE THE TRANSPORTATION TIME AND TO ACHIEVE AN OPTIMUM UTILIZATION, IT IS RECOMMENDED TO ModularLY DESIGN THE BERTH TERMINALS AND THE CARGO MAINTENANCE AREAS. IN THIS ARTICLE, BY CONSIDERING THE CHARACTERISTICS OF IRANIAN TRANSPORTATION SYSTEM AND ITS CURRENT NEEDS, THE Modular DESIGN SYSTEM, ITS NECESSITY, ITS CRITERIA'S AND PRINCIPLES, ITS VARIETIES AND ITS CONSISTING PARTS ARE SURVEYED AND AT THE END, A CASE SAMPLE WHICH WAS AT IMAM KHOMEINI PORT IS PROPOSED.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 108

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Author(s): 

Shimabukuro Osamu

Issue Info: 
  • Year: 

    2024
  • Volume: 

    12
  • Issue: 

    1
  • Pages: 

    79-87
Measures: 
  • Citations: 

    0
  • Views: 

    25
  • Downloads: 

    2
Abstract: 

Complementary pairs of symmetric $2$-designs are equivalent to coherent configurations of type $(2, 2; 2)$.D. G. Higman studied these coherent configurations and adjacency algebras of coherent configurations over a field of characteristic zero. These are always semisimple.  We investigate these algebras over fields of any characteristic prime and the structures.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 25

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 2 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Writer: 

Lael Fatemeh

Issue Info: 
  • Year: 

    2015
  • Volume: 

    46
Measures: 
  • Views: 

    137
  • Downloads: 

    126
Abstract: 

IN THIS TALK, FIRST WE REVIEW AND DISCUSS THE CONCEPTS OF 2-NORM AND 2-Modular.THEN, WE PROVE THAT EVERY 2-Modular INDUCES A 2-F-NORM. IN PARTICULAR, WE SHOW THAT A B-HOMOGENEOUS 2-Modular INDUCES A 2-F-NORM WITH A SPECIAL FORM.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 137

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 126
Writer: 

FALLAHI K. | RANJBAR K.

Issue Info: 
  • Year: 

    2013
  • Volume: 

    5
Measures: 
  • Views: 

    138
  • Downloads: 

    83
Abstract: 

THE PURPOSE OF THIS TALK IS TO STUDY THE CONTINUITY AND BOUNDEDNESS OF LINEAR OPERATORS DEFINED BETWEEN PROBABILISTIC (I.E., FUZZY) Modular SPACES IN THE PROBABILISTIC (I.E., FUZZY) SENSE.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 138

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 83
Issue Info: 
  • Year: 

    2010
  • Volume: 

    2
  • Issue: 

    4
  • Pages: 

    271-278
Measures: 
  • Citations: 

    0
  • Views: 

    336
  • Downloads: 

    96
Abstract: 

Recently, it has been obtained a lot of results on hyperconvex space (see [1, 2, 3, 5]). In this paper we develop some of those results for Modular hyperconvex spaces.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 336

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 96 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 3
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button