搜索结果: 1-5 共查到“军事学 overview”相关记录5条 . 查询时间(0.112 秒)
General Overview of the Authenticated Schemes for the First Round of the CAESAR Competition
authenticated encryption CAESAR competition symmetric cryptography
2016/1/6
The ongoing CAESAR competition aims at finding authenticated encryption schemes that offer
advantages over AES-GCM and are suitable for widespread adoption. At the moment, 48 remaining first-round
s...
Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks
Password Hashing Competition Overview Garbage-Collector Attacks
2016/1/6
In this work we provide an overview of the candidates of
the Password Hashing Competition (PHC) regarding to their functionality,
e.g., client-independent update and server relief, their security, e...
Application of Qualitative Methods in Health Research: An Overview
Participatory research techniques PRA In-depth techniques systematic techniques
2015/7/15
Qualitative research is type of formative research that includes specialized techniques for obtaining in-depth responses about what people think and how they feel. It is seen as the research that seek...
Overview of Turbo-Code Reconstruction Techniques
Turbo-Code Reconstruction Techniques recursive systematic coders turbo-code encoders
2009/6/11
In this paper we analyze different techniques to
blindly recover the parameters of turbo-code encoders with only
the knowledge of noisy eavesdropped binary stream. We compare
different strategies t...
Overview of Key Agreement Protocols
Key Agreement Protocols AK Authenticated Die-Hellman key agreement
2009/2/26
The emphasis of this paper is to focus on key agreement. To this aim, we address a selfcontained,up-to-date presentation of key agreement protocols at high level. We have attempted to provide a brief ...