To see the other types of publications on this topic, follow the link: Mansour.

Journal articles on the topic 'Mansour'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Mansour.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

de Julio, Maryann, and J. H. Matthews. "Joyce Mansour." SubStance 17, no. 2 (1988): 112. http://dx.doi.org/10.2307/3685148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Caws, M. A., and J. H. Matthews. "Joyce Mansour." World Literature Today 59, no. 4 (1985): 571. http://dx.doi.org/10.2307/40141958.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Knapp, Bettina L. "Joyce Mansour." Symposium: A Quarterly Journal in Modern Literatures 39, no. 1 (1985): 74–75. http://dx.doi.org/10.1080/00397709.1985.10733580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rifa'i, Amir. "KONSEP PENDIDIKAN PEMBEBASAN MANSOUR FAKIH." Kelola: Journal of Islamic Education Management 4, no. 2 (2019): 87–100. http://dx.doi.org/10.24256/kelola.v4i2.869.

Full text
Abstract:
This research has purpose to discuss about the educational concept of Mansour Fakih’s liberation and the relevance with Islamic education. The expectation of this research’s result is to give a solution or an idea for the purpose of Islamic education. This research is an answer from the Mansour Fakih educational liberation’s question, and it uses qualitative research whereas the method is library research. The collecting data have been done by investigating Mansour Fakih’s work especially about education while the data analysis that is used is word analysis which will express some literature from the research’s object. The research’s result shows that: 1. The educational concept of Mansour Fakih’s liberation is about critical liberation education that can be concluded as the education that doesn’t restrict the pupils to develop their creativities with some characteristics that are learning from experiences, not teaching, and dialogis 2. The relevance of Mansour Fakih education with Islamic education. From the educational concept of Mansour Fakih’s liberation with Islamic education is that both of them do not wish for the education that restrict because human’s essence is free.
APA, Harvard, Vancouver, ISO, and other styles
5

Howell, Jennifer. "Les Yeux de Mansour." Journal of North African Studies 25, no. 3 (2019): 498–500. http://dx.doi.org/10.1080/13629387.2019.1642678.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Ping, and Qian Yuan. "Minimizing Key Materials: The Even–Mansour Cipher Revisited and Its Application to Lightweight Authenticated Encryption." Security and Communication Networks 2020 (March 10, 2020): 1–6. http://dx.doi.org/10.1155/2020/4180139.

Full text
Abstract:
The Even–Mansour cipher has been widely used in block ciphers and lightweight symmetric-key ciphers because of its simple structure and strict provable security. Its research has been a hot topic in cryptography. This paper focuses on the problem to minimize the key material of the Even–Mansour cipher while its security bound remains essentially the same. We introduce four structures of the Even–Mansour cipher with a short key and derive their security by Patarin’s H-coefficients technique. These four structures are proven secure up to O˜2k/μ adversarial queries, where k is the bit length of the key material and μ is the maximal multiplicity. Then, we apply them to lightweight authenticated encryption modes and prove their security up to about minb/2,c,k−log μ-bit adversarial queries, where b is the size of the permutation and c is the capacity of the permutation. Finally, we leave it as an open problem to settle the security of the t-round iterated Even–Mansour cipher with short keys.
APA, Harvard, Vancouver, ISO, and other styles
7

Gilboa, Shoni, Shay Gueron, and Mridul Nandi. "Balanced Permutations Even–Mansour Ciphers." Cryptography 1, no. 1 (2016): 2. http://dx.doi.org/10.3390/cryptography1010002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lin, Teresa, and Skylar Gao. "Interview with Prof. John Mansour." ASVIDE 5 (July 2018): 598. http://dx.doi.org/10.21037/asvide.2018.598.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Velasquez, Steven, S. E. Schnatterly, and A. Mansour. "Velasquez, Schnatterly, and Mansour Reply." Physical Review Letters 61, no. 9 (1988): 1141. http://dx.doi.org/10.1103/physrevlett.61.1141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Spaeth, George L. "Mansour Armaly, MD (1927-2005)." Archives of Ophthalmology 125, no. 3 (2007): 439. http://dx.doi.org/10.1001/archopht.125.3.439.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Ahmet, KAVAS. "Vincent Mansour Monteil Vefat Etti." Ankara Üniversitesi İlahiyat Fakültesi Dergisi 46, no. 1 (2005): 1. http://dx.doi.org/10.1501/ilhfak_0000000372.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Blum, Binyamin. "The Hounds of Empire: Forensic Dog Tracking in Britain and its Colonies, 1888–1953." Law and History Review 35, no. 3 (2017): 621–65. http://dx.doi.org/10.1017/s0738248017000232.

Full text
Abstract:
On February 23, 1938, a Jerusalem Military Court convicted Mustafa Mansour of the unlawful possession of a weapon and for opening fire at a bus. The prosecution's key witness tying Mansour to the shooting was, however, not human but canine. Due to darkness the police could not pursue the “brigands” immediately following the incident. They returned at dawn accompanied by Doberman Pinschers. The dogs tracked footprints from the crime scene to the defendant's village, and then to his house, where the police discovered a few rounds of ammunition, some of which were spent.
APA, Harvard, Vancouver, ISO, and other styles
13

Elhariry, Yasser. "Divine breath of Genesis (Joyce Mansour)." Francosphères 6, no. 1 (2017): 61–86. http://dx.doi.org/10.3828/franc.2017.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

SHORLEY, C. "Review. Joyce Mansour. Matthews, J. H." French Studies 41, no. 1 (1987): 109. http://dx.doi.org/10.1093/fs/41.1.109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Wagner-Tsukamoto, Sigmund. "A Holistic Behavioural Economic Approach to Environmental Problems?" Journal of Interdisciplinary Economics 14, no. 1 (2003): 61–71. http://dx.doi.org/10.1177/02601079x03001400105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Mahmoud, Mohammed Ali. "Mansour Fahmy, Pioneer of Islamic Feminism in Modern Egyptian Thought." RUDN Journal of Philosophy 25, no. 2 (2021): 202–12. http://dx.doi.org/10.22363/2313-2302-2021-25-2-202-212.

Full text
Abstract:
Mansour Fahmy (1886-1959), one of the dramatic figures in modern Arab philosophical and social thought. He was the reformist and enlightenment figure in modern Arab history. He is also the owner of a notable current that was subjected to a violent attack that silenced him for a long time and forced him to "hide" physically. However, this did not eliminate the new opinions and positions that came at the beginning of the twentieth century towards the issue of women. He is the first to write with a scientific methodology - from the point of view of sociology - on Islamic discourse and its dealings with women. he sought to differentiate between religion and the religious establishment, between the personality of the Prophet Muhammad and what later prevailed in the books of jurisprudence and others. When he discussed the headscarf issue, he concluded that it was the product of traditions and customs that the Hijab is not from the Islamic religion. Islamic law has nothing to do with the Hijab. Mansour Fahmy's creativity was at one of the sensitive stages in Egypt's modern history in which the political, social, national, cultural, and revolution clashed in each one. All this, in turn, identified the problem of Mansour Fahmy's intellectual personality in the battles of thought and politics. This research's main task is to redraw the features of his actual personality and the reality of his intellectual, social, and political positions. Besides, this study seeks to uncover the effect of philosophy on crystallizing Mansour Fahmy's critical personality and its role in laying the foundations of the critical vision with its practical, reformist, and enlightening dimensions.
APA, Harvard, Vancouver, ISO, and other styles
17

Vasconcelos, Michele de Freitas Faria de, Rui Benevides Prates, and Marcos Ribeiro De Melo. "Infância, cinema, lirismo: a poética do sonho de Wadjda." Momento - Diálogos em Educação 28, no. 3 (2019): 26–46. http://dx.doi.org/10.14295/momento.v28i3.8393.

Full text
Abstract:
Aproximando imagens cinematográficas, poéticas e traquinagens, este artigo procura desestabilizar certezas sobre infância e relações de gênero. Experimentando uma etnografia de tela, nos encontramos com “O sonho de Wadjda”, em uma dupla caminhada: acompanhando os passos da menina-personagem e da diretora do longa-metragem, Haiffa Al Mansour, em suas possibilidades de transver, desdizer, inventar realidades. Enquanto esta subverte seu lugar de mulher-cineasta na cultura androcêntrica/patriarcal árabe, Wadjda, guiada pelo desejo de comprar uma bicicleta verde, põe em xeque as engrenagens religiosa e escolar que limitam seu território existencial. Mansour e Wadja reinventam a própria vida e, assim, nos convidam a embarcar em devires-criança e devires-mulher.
APA, Harvard, Vancouver, ISO, and other styles
18

Kim, HongTae. "이븐-맨서 스킴의 변형된 스킴에 관한 분석". Jouranl of Information and Security 20, № 1 (2020): 9–14. http://dx.doi.org/10.33778/kcsa.2020.20.1.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Bakhtiyari, Amin, Karimeh Haghani, Salar Bakhtiyari, et al. "Corrigendum to: Association between ABCC8 Ala1369Ser Polymorphism (rs757110 T/G) and Type 2 Diabetes Risk in an Iranian Population: A Case-Control Study." Endocrine, Metabolic & Immune Disorders - Drug Targets 21, no. 7 (2021): 1375. http://dx.doi.org/10.2174/187153032107210826095646.

Full text
Abstract:
Due to oversight on the part of the authors, the names of two of the co-authors have been incorrectly published in the article entitled, “Association between ABCC8 Ala1369Ser Polymorphism (rs757110 T/G) and Type 2 Diabetes Risk in an Iranian Population: A Case-Control Study”, 2021, Vol. 21, No. 3, pp. 441-447 [1]. The original article can be found online at: https://doi.org/10.2174/1871530320666200713091827. Original: Amin Bakhtiyari, Karimeh Haghani, Salar Bakhtiyari*, Mohammad A. Zaimy, Nooriali Zahed, Ali Gheysarzadeh, Shahram Darabi, Seidali Nahalkhani, Mansour Amraei and Iraj Alipourfard Corrected: Amin Bakhtiyari, Karimeh Haghani, Salar Bakhtiyari*, Mohammad A. Zaimy, Ali Noori-Zadeh, Ali Gheysarzadeh, Shahram Darabi, Ali Seidkhani-Nahal, Mansour Amraei and Iraj Alipourfard
APA, Harvard, Vancouver, ISO, and other styles
20

Rumawi, Rumawi. "Dalam Sistem Matrilineal Pun, Perempuan Tidak Memimpin (Book Review)." Musãwa Jurnal Studi Gender dan Islam 3, no. 1 (2004): 115. http://dx.doi.org/10.14421/musawa.2004.31.115-118.

Full text
Abstract:
Judul : Partisipasi Politik Perempuan.Penulis : L.Verayanti, L. Herlina, Dwi Hertha dan Zaiyardam Zubir.Pengantar : Mansour Fakih.Penerbit : LP2M Padang, kerja sama dengan Asia Foundation.Cetakan : Pertama, November 2003.Tebal : xvii + 107 halaman
APA, Harvard, Vancouver, ISO, and other styles
21

Ilesbekov, Bizhan, Shamshadin Kerim, and Azamat Zhamashev. "Ahmad Ibn Mansour and other Ispidzhabic Scientists." Eurasian Journal of Religious studies 22, no. 2 (2020): 11–18. http://dx.doi.org/10.26577/ejrs.2020.v22.i2.r2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Stevenson, Deborah. "The Green Bicycle by Haifaa Al Mansour." Bulletin of the Center for Children's Books 69, no. 4 (2015): 182–83. http://dx.doi.org/10.1353/bcc.2015.0937.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Collani, Tania. "Joyce Mansour, Œuvres complètes. Prose et poésie." Studi Francesi, no. 177 (LIX | III) (December 1, 2015): 627. http://dx.doi.org/10.4000/studifrancesi.1446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Chen, Shan, Rodolphe Lampe, Jooyoung Lee, Yannick Seurin, and John Steinberger. "Minimizing the Two-Round Even–Mansour Cipher." Journal of Cryptology 31, no. 4 (2018): 1064–119. http://dx.doi.org/10.1007/s00145-018-9295-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Xu, Aimin. "A general rational sum identity." Filomat 29, no. 8 (2015): 1721–27. http://dx.doi.org/10.2298/fil1508721x.

Full text
Abstract:
In this paper, by means of divided differences and an inverse pair formula we present a general rational sum identity which generalizes some identities of Chu-Yan, Prodinger, Mansour-Shattuck-Song and Ismail-Stanton.
APA, Harvard, Vancouver, ISO, and other styles
26

Aburawi, ElhadiH. "Mansour Al Mabrouk Ali Ben Halim (1937–2018)." Ibnosina Journal of Medicine and Biomedical Sciences 10, no. 4 (2018): 145. http://dx.doi.org/10.4103/ijmbs.ijmbs_43_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Petterson, James, and Stéphanie Caron. "Réinventer le lyrisme: Le surréalisme de Joyce Mansour." Modern Language Review 103, no. 3 (2008): 864. http://dx.doi.org/10.2307/20467966.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Sommer, Gabriele. "Review of Mansour (1993): Multilingualism and Nation Building." Language Problems and Language Planning 20, no. 1 (1996): 65–66. http://dx.doi.org/10.1075/lplp.20.1.12som.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Zurbrigg, K. "Cultivating History: Amina Mansour: A Work in Progress." Nka Journal of Contemporary African Art 2001, no. 13-14 (2001): 62–65. http://dx.doi.org/10.1215/10757163-13-14-1-62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Dunkelman, Orr, Nathan Keller, and Adi Shamir. "Slidex Attacks on the Even–Mansour Encryption Scheme." Journal of Cryptology 28, no. 1 (2013): 1–28. http://dx.doi.org/10.1007/s00145-013-9164-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Zhang, Ping, and Hong-Gang Hu. "Generalized Tweakable Even-Mansour Cipher and Its Applications." Journal of Computer Science and Technology 33, no. 6 (2018): 1261–77. http://dx.doi.org/10.1007/s11390-018-1886-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Chmutov, Sergei, and Fabien Vignes-Tourneret. "On a conjecture of Gross, Mansour and Tucker." European Journal of Combinatorics 97 (October 2021): 103368. http://dx.doi.org/10.1016/j.ejc.2021.103368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Hao, Xuexuan, Fengrong Zhang, Yongzhuang Wei, and Yong Zhou. "Quantum period finding based on the Bernstein-Vazirani algorithm." Quantum Information and Computation 20, no. 1&2 (2020): 65–84. http://dx.doi.org/10.26421/qic20.1-2-4.

Full text
Abstract:
Quantum period finding algorithms have been used to analyze symmetric cryptography. For instance, the 3-round Feistel construction and the Even-Mansour construction could be broken in polynomial time by using quantum period finding algorithms. In this paper, we firstly provide a new algorithm for finding the nonzero period of a vectorial function with O(n) quantum queries, which uses the Bernstein-Vazirani algorithm as one step of the subroutine. Afterwards, we compare our algorithm with Simon's algorithm. In some scenarios, such as the Even-Mansour construction and the function satisfying Simon's promise, etc, our algorithm is more efficient than Simon's algorithm with respect to the tradeoff between quantum memory and time. On the other hand, we combine our algorithm with Grover's algorithm for the key-recovery attack on the FX construction. Compared with the Grover-Meets-Simon algorithm proposed by Leander and May at Asiacrypt 2017, the new algorithm could save the quantum memory.
APA, Harvard, Vancouver, ISO, and other styles
34

Mennink, Bart, and Samuel Neves. "On the Resilience of Even-Mansour to Invariant Permutations." Designs, Codes and Cryptography 89, no. 5 (2021): 859–93. http://dx.doi.org/10.1007/s10623-021-00850-2.

Full text
Abstract:
AbstractSymmetric cryptographic primitives are often exposed to invariances: deterministic relations between plaintexts and ciphertexts that propagate through the primitive. Recent invariant subspace attacks have shown that these can be a serious issue. One way to mitigate invariant subspace attacks is at the primitive level, namely by proper use of round constants (Beierle et al., CRYPTO 2017). In this work, we investigate how to thwart invariance exploitation at the mode level, namely by assuring that a mode never evaluates its underlying primitive under any invariance. We first formalize the use of invariant cryptographic permutations from a security perspective, and analyze the Even-Mansour block cipher construction. We further demonstrate how the model composes, and apply it to the keyed sponge construction. The security analyses exactly pinpoint how the presence of linear invariances affects the bounds compared with analyses in the random permutation model. As such, they give an exact indication how invariances can be exploited. From a practical side, we apply the derived security bounds to the case where the Even-Mansour construction is instantiated with the 512-bit ChaCha permutation, and derive a distinguishing attack against Even-Mansour-ChaCha in $$2^{128}$$ 2 128 queries, faster than the birthday bound. Comparable results are derived for instantiation using the 200-bit Keccak permutation without round constants (attack in $$2^{50}$$ 2 50 queries), the 1024-bit CubeHash permutation (attack in $$2^{256}$$ 2 256 queries), and the 384-bit Gimli permutation without round constants (attack in $$2^{96}$$ 2 96 queries). The attacks do not invalidate the security of the permutations themselves, but rather they demonstrate the tightness of our bounds and confirm that care should be taken when employing a cryptographic primitive that has nontrivial linear invariances.
APA, Harvard, Vancouver, ISO, and other styles
35

Kherkhour, Taous. "La zawiya de Sidi Mansour : pôle du savoir religieux." Insaniyat / إنسانيات, no. 72-73 (September 30, 2016): 115–29. http://dx.doi.org/10.4000/insaniyat.16324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

ISOBE, Takanori, and Kyoji SHIBUTANI. "Key-Recovery Security of Single-Key Even-Mansour Ciphers." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E103.A, no. 7 (2020): 893–905. http://dx.doi.org/10.1587/transfun.2019eap1118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Collins, Sonya. "Mansour uses health kiosks to bolster patient–pharmacist relationships." Pharmacy Today 20, no. 9 (2014): 42–44. http://dx.doi.org/10.1016/s1042-0991(15)30704-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Mustienes, Gemma Ventura. "L'algérianité de Latifa Ben Mansour, un « tiers espace » identitaire." Expressions maghrébines 14, no. 1 (2015): 73–81. http://dx.doi.org/10.1353/exp.2015.0005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Buchanan, Sarah B. ""Amul Yakar, c'est moi": Entretien avec Mansour Sora Wade." Nouvelles Études Francophones 33, no. 1 (2018): 165–77. http://dx.doi.org/10.1353/nef.2018.0011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Dinur, Itai, Orr Dunkelman, Nathan Keller, and Adi Shamir. "Key Recovery Attacks on Iterated Even–Mansour Encryption Schemes." Journal of Cryptology 29, no. 4 (2015): 697–728. http://dx.doi.org/10.1007/s00145-015-9207-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Caron, Stéphanie. "Réinventer le lyrisme. Joyce Mansour, poète-femme du surréalisme." L'information littéraire Vol. 54, no. 3 (2002): 11–17. http://dx.doi.org/10.3917/inli.543.0011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Shinagawa, Kazuo, and Tetsu Iwata. "Quantum attacks on Sum of Even-Mansour pseudorandom functions." Information Processing Letters 173 (January 2022): 106172. http://dx.doi.org/10.1016/j.ipl.2021.106172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Hale, C. E., and V. Spibey. "The effects of Reiki on the heart rate of horses." BSAP Occasional Publication 35 (2006): 301–4. http://dx.doi.org/10.1017/s0263967x00042956.

Full text
Abstract:
Reiki is an increasingly popular form of complementary therapy. It originated in Japan, and is used to promote relaxation and healing (Rand, 2000). Reiki is a vibrational therapy that is claimed by practioners to be a method of channelling universal life energy (Mansour et al., 1999). This energy is then claimed to balance the biofield and initiate the body's own healing processes (Miles & True, 2003). The therapy involves the flow and transfer of energy, from the practitioner, to the patient. Often described as the “laying on of hands” (Rand, 2000), patients report feelings of warmth, deep relaxation, sleepiness, happiness, increased spiritual awareness, (Rand, 2000) and improved pain control (Olson et al., 2003).Reiki has become popular as an adjunct to conventional medicine (Miles & True, 2003; Olson & Hanson, 1997), and is increasingly being used alongside traditional palliative care for people with serious illnesses (Miles & True, 2003; Wardell & Engebretson, 2001; Neild-Anderson & Ameling, 2000; Mansour et al., 1999; Bullock, 1997; Olson & Hanson, 1997).
APA, Harvard, Vancouver, ISO, and other styles
44

M. Al-Tamimi, Ali, and Noor M. Asmael. "CHARACTERISTICS OF ON-STREET PARKING, CASE STUDY AL-ROWAD STREET IN AL-MANSOUR AREA / BAGHDAD." Journal of Engineering and Sustainable Development 25, no. 5 (2021): 49–55. http://dx.doi.org/10.31272/jeasd.25.5.5.

Full text
Abstract:
Parking facility is one of the important means to regulate traffic and facilitate the movement of vehicles in commercial, industrial and entertainment areas. On-street parking is one of the most important problems that need to be managed and organized, especially at peak hours for the area. In the Mansour area and Al-Rowad Street in particular, it is one of the important streets in the city of Baghdad and is due to the presence of various commercial centers, such as Al-Mansour Mall, in addition to shopping centers, restaurants, medical clinics and educational centers. The study took place during the week. The data collection time is for five hours (5: 00-10: 00) PM . The mechanism for collecting data was manually. The data showed that the peak hours start from five in the afternoon and continue until ten in the evening. According to the cumulative scheme, the rush hour was at 8:00 pm with 150 vehicles, as the street capacity is 168 spaces. Moreover, the duration time ranged between (30-60) minutes. Turnover rate was 2.16.
APA, Harvard, Vancouver, ISO, and other styles
45

Teh, Je Sen, and Azman Samsudin. "A Chaos-Based Authenticated Cipher with Associated Data." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/9040518.

Full text
Abstract:
In recent years, there has been a rising interest in authenticated encryption with associated data (AEAD) which combines encryption and authentication into a unified scheme. AEAD schemes provide authentication for a message that is divided into two parts: associated data which is not encrypted and the plaintext which is encrypted. However, there is a lack of chaos-based AEAD schemes in recent literature. This paper introduces a new 128-bit chaos-based AEAD scheme based on the single-key Even-Mansour and Type-II generalized Feistel structure. The proposed scheme provides both privacy and authentication in a single-pass using only one 128-bit secret key. The chaotic tent map is used to generate whitening keys for the Even-Mansour construction, round keys, and random s-boxes for the Feistel round function. In addition, the proposed AEAD scheme can be implemented with true random number generators to map a message to multiple possible ciphertexts in a nondeterministic manner. Security and statistical evaluation indicate that the proposed scheme is highly secure for both the ciphertext and the authentication tag. Furthermore, it has multiple advantages over AES-GCM which is the current standard for authenticated encryption.
APA, Harvard, Vancouver, ISO, and other styles
46

HOSOYAMADA, Akinori, and Kazumaro AOKI. "On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E102.A, no. 1 (2019): 27–34. http://dx.doi.org/10.1587/transfun.e102.a.27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Arena, Sara. "Stéphanie Caron, Réinventer le lyrisme. Le surréalisme de Joyce Mansour." Studi Francesi, no. 155 (LII | II) (October 1, 2008): 489–90. http://dx.doi.org/10.4000/studifrancesi.9032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Mansour, Stephen M. "A review of APL-Berlin-2000 by Stephen M. Mansour." ACM SIGAPL APL Quote Quad 31, no. 1 (2000): 20–24. http://dx.doi.org/10.1145/500629.500633.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Culwell, Kelly R., and Kathryn M. Curtis. "Contraceptive options for women with SLE: response to Mansour letter." Journal of Family Planning and Reproductive Health Care 39, no. 2 (2013): 151–52. http://dx.doi.org/10.1136/jfprhc-2012-100574.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Wilcox, Oliver. "Libya's Qaddafi: The Politics of Contradiction; Mansour O. El-Kikhia." Digest of Middle East Studies 7, no. 3 (1998): 81–84. http://dx.doi.org/10.1111/j.1949-3606.1998.tb00331.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!