Analysis of security criteria for block ciphers

Download
1999
Aras, Ekrem

Suggestions

Analysis of Multiobjective Algorithms for the Classification of Multi-Label Video Datasets
Karagoz, Gizem Nur; Yazıcı, Adnan; Dokeroglu, Tansel; Cosar, Ahmet (Institute of Electrical and Electronics Engineers (IEEE), 2020)
It is of great importance to extract and validate an optimal subset of non-dominated features for effective multi-label classification. However, deciding on the best subset of features is an NP-Hard problem and plays a key role in improving the prediction accuracy and the processing time of video datasets. In this study, we propose autoencoders for dimensionality reduction of video data sets and ensemble the features extracted by the multi-objective evolutionary Non-dominated Sorting Genetic Algorithm and t...
Analysis of certain serial search strategies for FM frequency hopping system
Tekinel, Nazan; Tanık, Yalçın; Department of Electrical and Electronics Engineering (1988)
Analysis of security requirements for cryptographic voting protocols (extended abstract)
Cetinkaya, Orhan (2008-03-07)
Electronic voting refers to the use of computers or computerized voting equipment to cast ballots in an election and it is not an easy task due to the need of achieving electronic voting security requirements. The cryptographic voting protocols use advanced cryptography to make electronic voting secure and applicable.
Analysis of threshold dynamics of epidemic models in a periodic environment
Evcin, Cansu; Uğur, Ömür; Department of Scientific Computing (2013)
Threshold dynamics used to control the spread of the disease in infectious disease phenomena has an overwhelming importance and interest in mathematical epidemiology. One of the famous threshold quantity is known to be the basic reproduction ratio. Its formulation as well as computation is the main concern of infectious diseases. The aim of this thesis is to analyze the basic reproduction ratio in both autonomous and periodic systems via defining R0 as the spectral radius of the next generation operator. Th...
Analysis of methods for border ownership estimation
Olgunsoylu, Sertaç; Kalkan, Sinan; Department of Computer Engineering (2015)
Border Ownership (BO) signifies which side of an image border owns the border. This information is very important for many computer vision problems. There are various approaches for estimating BO in the literature. One approach is to use methods that rely on low-level local features; combinations of local visual cues such as convexity or junctions and using spectral features have been proven to be quite effective. Alternatively, global constraints or cues can be imposed on top of local cue predictions to ma...
Citation Formats
E. Aras, “Analysis of security criteria for block ciphers,” Middle East Technical University, 1999.