• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,918
Next 10 →

Table 2: Liste des intervalles de valeurs des indices pour une forme de type pieuvre (figure 3).

in unknown title
by unknown authors

Table 1: Nonlinearity of S-boxes DES s2DES s3DES s5DES

in How to Strengthen DES against Two Robust Attacks
by Kwangjo Kim, Sangjun Park, Sangjun Park, Daiki Lee 1995
"... In PAGE 6: ... In this Section, we compare the quantitative characteristics of S-boxes in DES and siDES in various points of cryptographic view and evaluate the goodness-of- t of them. We checked the nonlinearity of 4 Boolean functions: Z6 2 ! Z2 consisting of an S-box as shown in Table1 . In the output bit column of this table, 4 denotes the most signi cant location of an output vector and 1 denotes the least signi cant location of an output vector.... ..."
Cited by 1

Table 1. Deux pseudo-codes pour un algorithme de codage adaptatif Choisir un niveau de tolerance ec. Mettre R1 = I2 et le marquer comme non couvert. Tant qu apos;il y a des ranges non couverts Ri faire f Parmi les domaines possibles D, trouver le domaine Di et le wi correspondant qui couvrent le mieux Ri (i.e. qui minimise l apos;expression (4)). Si (f \ (Ri I); wi(f)) lt; ec ou taille(Ri) rmin alors Marquer Ri comme couvert, et sauvegarder la transformation wi; sinon Partitionnner Ri en des ranges plus petits, qui sont marqu es non couverts, et enlever Ri de la liste des ranges non couverts. g

in Compression Fractale d'Images
by Yuval Fisher, Matthieu Latapy, Diderot Paris
"... In PAGE 21: ... x6 Quelques Notes sur l apos;Implantation. Le pseudo-code de la Table1 montre deux mani eres de coder des images en utilisant l apos;id ee pr esent ee. Une m ethode tente d apos;atteindre une certaine d elit e en trouvant des re- couvrements tels que l apos; equation 4 est inf erieure a un certain crit ere ec.... ..."

Table 3: R-robustness of S-boxes DES s2DES s3DES s5DES

in How to Strengthen DES against Two Robust Attacks
by Kwangjo Kim, Sangjun Park, Sangjun Park, Daiki Lee 1995
"... In PAGE 8: ... In either case the value 26 in the rst row is not counted. R-robustness against di erential cryptanalysis can be de ned by R = (1 ? N 26 )(1 ? d 26 ): We have checked the R-robustness of DES and siDES as shown in Table3 . All DES-like cryptosystems Table 3: R-robustness of S-boxes DES s2DES s3DES s5DES... ..."
Cited by 1

Table 4: Average (pi;j) values of S-boxes Box DES s2DES s3DES s5DES

in Securing DES S-boxes against Three Robust Cryptanalysis
by Kwangjo Kim, Sangjoon Park, Sangjoon Park, Daiki Lee 1995
"... In PAGE 9: ...ariable xi is complemented. The average values, i.e., (pi;1 + pi;2 + pi;3 + pi;4)=4 of (pi;j) of S-boxes in DES and siDES are compared in Table4 . Whenever one bit of input in s2DES is complemented, every Table 4: Average (pi;j) values of S-boxes Box DES s2DES s3DES s5DES... ..."
Cited by 4

Table 4: Average (pi;j) values of S-boxes Box DES s2DES s3DES s5DES

in How to Strengthen DES against Two Robust Attacks
by Kwangjo Kim, Sangjun Park, Sangjun Park, Daiki Lee 1995
"... In PAGE 8: ...ariable xi is complemented. The average values, i.e., (pi;1 + pi;2 + pi;3 + pi;4)=4 of (pi;j) of S-boxes in DES and siDES are compared in Table4 . Whenever one bit of input in s2DES is complemented, every Table 4: Average (pi;j) values of S-boxes Box DES s2DES s3DES s5DES... ..."
Cited by 1

Table 3: R-robustness of S-boxes DES s2DES s3DES s5DES Box N R N R N R N R

in Securing DES S-boxes against Three Robust Cryptanalysis
by Kwangjo Kim, Sangjoon Park, Sangjoon Park, Daiki Lee 1995
"... In PAGE 8: ... In either case the value 26 in the rst row is not counted. R-robustness against di erential cryptanalysis can be de ned by R = (1 ? N 26 )(1 ? d 26 ): We have checked the R-robustness of DES and siDES as shown in Table3 . All DES-like cryptosystems have... ..."
Cited by 4

Table 1: Nonlinearity of S-boxes DES s2DES s3DES s5DES Box output bit output bit output bit output bit

in Securing DES S-boxes against Three Robust Cryptanalysis
by Kwangjo Kim, Sangjoon Park, Sangjoon Park, Daiki Lee 1995
"... In PAGE 8: ...Local Properties We compare the quantitative characteristics of S-boxes in DES and siDES in various points of crypto- graphic view and evaluate the goodness-of- t of them. We checked the nonlinearity of 4 Boolean functions: Z6 2 ! Z2 consisting of an S-box as shown in Table1 . In the output bit column of this table, 4 denotes the most signi cant location of an output vector and 1 denotes the least signi cant location of an output vector.... ..."
Cited by 4

Table II. Di erents param etres intervenant dans les mod eles consid er es 3 Mod elisation des ph enom enes de catalyse par des sch emas r eactionnels h et erog enes A n de fournir une mod elisation plus proche de la r ealit e physique, on pr e- sente maintenant un mod ele des ph enom enes de catalyse qui consid ere un

in Modèles Pratiques De Catalyse à La Paroi Pour Les Calculs D'écoulements Hypersoniques
by Calcul Scientifique, Maria Vittoria Salvetti, Maria Vittoria Salvetti, Programme Calcul Scientifique, Mod'elisation Et Logiciel Num'erique, Projet Sinus-inria, Sophia Antipolis 1993

Tableau 1 Le graphe a une epaisseur maximale de 7. La premi ere fois que celui-ci est 7-coloriable, la boucle a et e d eroul ee 3 fois. Le second tableau montre l apos;allocation nale des registres symboliques.

in Parallélisation De Boucles: Contraintes De Ressources Et Registres
by Actes Des, C. Eisenbeis, S. Lelait, A. Sawaya, J. Wang
Next 10 →
Results 1 - 10 of 2,918
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University