Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search

Showing results 81 - 90 of 2149264 documents for pjka x vr Navtivte web na WWWLOAN24HXYZ podmnky zskn pjky petrova pujcka diskuze sms pujcka online Nov Msto nad Metuj pujky domu brno na 30 dni pjky penz online nov pjka do vplaty help pujcka jicin pujka 2000 online do vplaty hned pjky s ruenm mini pjky ihned bez registru online pujcka ihned na cet Valask Mezi pujcka online ihned Kada pjka bez registru olomouc
Relevance
Date
  1. Elephant Changelog

    https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/changelog-files/elephant-changelog.pdf
    Elephant v1.1 Submitters: Tim Beyne KU Leuven and imec-COSIC, Belgium Yu Long Chen KU Leuven and imec-COSIC, Belgium Christoph Dobraunig Radboud University, The Netherlands Bart Mennink Radboud University, The Netherlands Corresponding submitter: Bart Mennink elephant@cs.ru.nl +31 24 3652672 Radboud University, The Netherlands Toernooiveld 212 6525 EC Nijmegen The Netherlands February 25 :::::::::: September :::: 27, 2019 1 Introduction We introduce the Elephant authenticated encryption scheme. The mode of Elephant is a nonce-based encrypt-then-MAC construction, where encryption is performed using counter mode and message authentication using a variant of the Wegman-Carter-Shoup [10,82,92] MAC function. Both modes internally use a cryptographic permutation masked using LFSRs, akin to the masked Even- Mansour construction of Granger et al. [49]. The mode is permu...
  2. Elephant Specification

    https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/spec-doc-rnd2/elephant-spec-round2.pdf
    Elephant v1.1 Submitters: Tim Beyne KU Leuven and imec-COSIC, Belgium Yu Long Chen KU Leuven and imec-COSIC, Belgium Christoph Dobraunig Radboud University, The Netherlands Bart Mennink Radboud University, The Netherlands Corresponding submitter: Bart Mennink elephant@cs.ru.nl +31 24 3652672 Radboud University, The Netherlands Toernooiveld 212 6525 EC Nijmegen The Netherlands September 27, 2019 1 Introduction We introduce the Elephant authenticated encryption scheme. The mode of Elephant is a nonce-based encrypt-then-MAC construction, where encryption is performed using counter mode and message authentication using a variant of the Wegman-Carter-Shoup [10,82,92] MAC function. Both modes internally use a cryptographic permutation masked using LFSRs, akin to the masked Even- Mansour construction of Granger et al. [49]. The mode is permutation-based and only evaluat...
  3. Elephant

    https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/documents/round-1/spec-doc/elephant-spec.pdf
    Elephant v1 Submitters: Tim Beyne KU Leuven and imec-COSIC, Belgium Yu Long Chen KU Leuven and imec-COSIC, Belgium Christoph Dobraunig Radboud University, The Netherlands Bart Mennink Radboud University, The Netherlands Corresponding submitter: Bart Mennink elephant@cs.ru.nl +31 24 3652672 Radboud University, The Netherlands Toernooiveld 212 6525 EC Nijmegen The Netherlands February 25, 2019 1 Introduction We introduce the Elephant authenticated encryption scheme. The mode of Elephant is a nonce-based encrypt-then-MAC construction, where encryption is performed using counter mode and message authentication using a variant of the Wegman-Carter-Shoup [10,82,92] MAC function. Both modes internally use a cryptographic permutation masked using LFSRs, akin to the masked Even- Mansour construction of Granger et al. [49]. The mode is permutation-based and only evaluates ...
  4. https://csrc.nist.gov/csrc/media/projects/post-quantum-cryptography/documents/round-1/submissions/saber.zip

    https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/round-1/submissions/SABER.zip
    SABER_KEM/README.txt For Keccak and AES we are using open-source code developed by authors listed in comments on top of the respective files. Source codes of the algorithms for "LightSaber", "Saber", "FireSaber" - All reference implementations inside "Reference_Implementation_KEM" directory. - All optimized implementations inside "Optimized_Implementation_KEM" directory. KAT files present inside "KAT" directory. - KAT files for "LightSaber" inside KAT/light_saber -- PQCkemKAT_1568.req : input for Known Answer Test -- PQCkemKAT_1568.rsp : output for Known Answer Test - KAT files for "Saber" inside KAT/saber -- PQCkemKAT_2304.req : input for Known Answer Test -- PQCkemKAT_2304.rsp : output for Known Answer Test - KAT files for "FireSaber" inside KAT/fire_...
  5. Precision Grasp Control with a Pneumatic Gripper

    https://www.nist.gov/system/files/documents/2018/07/30/advanced_tactile_perception_for_materials_handling_and_collaborative_robotics_in_industrial_tasks.pdf
     Abstract— Robotic manipulation is often limited not by the finesse achievable by mechanisms employed, but rather by the perceptive capacity of the sensors used for perceiving the environment and the control algorithms employed. At our Next Generation Systems Lab, we are investigating novel methods of integrated perception and control including Robotic Skin and Deep Neural Nets for grasping and manipulation. Robotic skin is a key type of heteroceptive sensor, inspired by nature, which could eventually enable co-Robots to share their workspace with humans. Despite considerable progress in that last 30 years with this “holy grail” product, numerous fabrication, integration, dynamic performance, reliability, and cost challenges remain in realizing robotic skins, which is why several projects around the world, and the US National Robotics In...
  6. https://www.nist.gov/system/files/documents/2017/05/09/physreva_80_052507.pdf

    https://www.nist.gov/system/files/documents/2017/05/09/PhysRevA_80_052507.pdf
    Hylleraas-configuration-interaction study of the 2 2S ground state of neutral lithium and the first five excited 2S states James S. Sims National Institute of Standards and Technology, Gaithersburg, Maryland 20878-9957, USA Stanley A. Hagstrom Department of Chemistry, Indiana University, Bloomington, Indiana 47405, USA �Received 15 September 2009; published 19 November 2009� High-precision Hylleraas-configuration-interaction �Hy-CI� method variational calculations are reported for the 2 2S ground state of neutral lithium. The nonrelativistic energy is calculated to be −7.478 060 323 451 9 hartree, demonstrating that the Hy-CI technique is capable of sub-nanohartree accuracy for three-electron systems. A Hylleraas expansion without linked products of odd powers of rij gives −7.478 060 323 452 hartree, showing the relative unimportance of such terms for lithium at ...
  7. p-Mentha-1,5-dien-8-ol

    https://webbook.nist.gov/cgi/cbook.cgi?ID=C1686200&Mask=2000&Type=ALKANE-RI-POLAR-RAMP&Units=SI
    p-Mentha-1,5-dien-8-ol Formula: C10H16O Molecular weight: 152.2334 IUPAC Standard InChI: InChI=1S/C10H16O/c1-8-4-6-9(7-5-8)10(2,3)11/h4-6,9,11H,7H2,1-3H3 Download the identifier in a file. IUPAC Standard InChIKey: FQEXRDMYDXBXEO-UHFFFAOYSA-N CAS Registry Number: 1686-20-0 Chemical structure: This structure is also available as a 2d Mol file or as a computed 3d SD file The 3d structure may be viewed using Java or Javascript. Other names: 2,4-Cyclohexadiene-1-methanol, α,α,4-trimethyl-; α-Phellandren-8-ol; α-Phellandrene-8-ol; 1,5-p-Menthadien-8-ol; p-1,5-Menthadien-8-ol; p-1,5-Menthadienol-8; para-Mentha-1,5-dien-8-ol; p-Menth-1,5-dien-8-ol; p-Mentha-1,5-diene-8-ol; Phellandren-8-ol, α-; Mentha-1,5-diene-8-ol; p-Mentha-1,5-dien-8-ol (α-phellandren-8-ol); Phellandrene-8-α-ol; p-Mentha-2,6-dien-8-ol; Menth-1,5-diene-8-ol; Mentha-1,5-dien-8-ol Permanent link for this species. ...
  8. https://csrc.nist.gov/csrc/media/projects/post-quantum-cryptography/documents/round-1/submissions/ding_lwe_key_exchange.zip

    https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/round-1/submissions/Ding_LWE_Key_Exchange.zip
    KAT/PQCgenKAT_kem.c // // PQCgenKAT_kem.c // // Created by Bassham, Lawrence E (Fed) on 8/29/17. // Copyright © 2017 Bassham, Lawrence E (Fed). All rights reserved. // #include <stdio.h> #include <stdlib.h> #include <string.h> #include <ctype.h> #include "rng.h" #include "api.h" #define MAX_MARKER_LEN 50 #define KAT_SUCCESS 0 #define KAT_FILE_OPEN_ERROR -1 #define KAT_DATA_ERROR -3 #define KAT_CRYPTO_FAILURE -4 int FindMarker(FILE *infile, const char *marker); int ReadHex(FILE *infile, unsigned char *A, int Length, char *str); void fprintBstr(FILE *fp, char *S, unsigned char *A, unsigned long long L); int main() { char fn_req[32], fn_rsp[32]; FILE *fp_req, *fp_rsp; unsigned char seed[48]; unsigned char entropy_input[48]; unsigned char ct[CRY...
  9. The Effect on Neutral Earthing Practices on Lightning Current Dispersion in a Low-Voltage Installation

    https://www.nist.gov/system/files/documents/pml/div684/Neutral_earthing.pdf
    The Effect of Neutral Earthing Practices on Lightning Current Dispersion in a Low-Voltage Installation Arshad Mansoor, Member, IEEE Power Electronics Applications Center Knoxville TN 37932 USA Amansoor@epri-peac.com François Martzloff, Life Fellow, IEEE National Institute of Standards and Technology Gaithersburg MD 20899 USA f.martzloff@ieee.org © 1996 IEEE Reprinted, with permission, from IEEE Transactions on Power Delivery, Vol.12, No.3, July 1997 Significance: Part 2 – Development of standards – Reality checks Part 4 – Propagation and coupling of surges In the case of a direct lightning stroke to a building, the earth-seeking current is dispersed among all available paths to earthing electrodes, including intentional made electrodes and opportunistic electrodes. A substantial part of that current will exit the building via its connection to the power distribut...
  10. https://csrc.nist.gov/csrc/media/projects/post-quantum-cryptography/documents/round-2/submissions/newhope-round2.zip

    https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/round-2/submissions/NewHope-Round2.zip
    NIST-PQ-Submission-NewHope-20190330/Additional_Implementations/avx2/crypto_kem/newhope1024cca/api.h #ifndef API_H #define API_H #include "params.h" #define CRYPTO_SECRETKEYBYTES NEWHOPE_CCAKEM_SECRETKEYBYTES #define CRYPTO_PUBLICKEYBYTES NEWHOPE_CCAKEM_PUBLICKEYBYTES #define CRYPTO_CIPHERTEXTBYTES NEWHOPE_CCAKEM_CIPHERTEXTBYTES #define CRYPTO_BYTES NEWHOPE_SYMBYTES #if (NEWHOPE_N == 512) #define CRYPTO_ALGNAME "NewHope512-CCAKEM" #elif (NEWHOPE_N == 1024) #define CRYPTO_ALGNAME "NewHope1024-CCAKEM" #else #error "NEWHOPE_N must be either 512 or 1024" #endif int crypto_kem_keypair(unsigned char *pk, unsigned char *sk); int crypto_kem_enc(unsigned char *ct, unsigned char *ss, const unsigned char *pk); int crypto_kem_dec(unsigned char *ss, const unsigned char *ct, const unsigned char *sk); #endif NIST-PQ-Submissi...
Showing results 81 - 90 of 2149264 documents for pjka x vr Navtivte web na WWWLOAN24HXYZ podmnky zskn pjky petrova pujcka diskuze sms pujcka online Nov Msto nad Metuj pujky domu brno na 30 dni pjky penz online nov pjka do vplaty help pujcka jicin pujka 2000 online do vplaty hned pjky s ruenm mini pjky ihned bez registru online pujcka ihned na cet Valask Mezi pujcka online ihned Kada pjka bez registru olomouc