• Title/Summary/Keyword: Md

Search Result 3,334, Processing Time 0.023 seconds

Security Analysis of Block Cipher MD-64 Suitable for Wireless Sensor Network Environments (무선 센서 네트워크 환경에 적합한 블록 암호 MD-64에 대한 안전성 분석)

  • Lee, Chang-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.5
    • /
    • pp.865-870
    • /
    • 2011
  • MD-64 is a 64-bit block cipher suitable for the efficient implementation in hardware environments such as WSN. In this paper, we propose a related-key amplified boomerang attack on the full-round MD-64. The attack on the full-round MD-64 requires $2^{45.5}$ related-key chosen plaintexts and $2^{95}$ MD-64 encryptions. This work is the first known cryptanalytic result on MD-64.

The Prospect of Membrane Distillation (Membrane Distillation의 전망)

  • 조한욱;신우철
    • Membrane Journal
    • /
    • v.7 no.2
    • /
    • pp.57-64
    • /
    • 1997
  • Membrane Distillation(MD) is reviewed as an application to new separation technology. Hydrophobic membrane which has been used to microfiltration is feasible material for MD process. MD has perfect selectivity under moderate temperature and is promised to simplify typical water treatment process. The principle of MD separation is phase transition by vapor-liquid interface at the pore of membrane surface. Feed and permeate temperature, composition, membrane wetting, heat and mass transfer phenomena affect the selectivity and flux of MD.

  • PDF

A study on the MD&A Disclosure Quality in real-time calculated and provided By Programming Technology

  • Shin, YeounOuk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.41-48
    • /
    • 2019
  • The Management Discussion and Analysis(MD&A) provides investors with an opportunity to gain insight into the company from a manager's perspective and enables short-term and long-term analysis of the business. And MD&A is an important channel through which companies and investors can communicate, providing a useful source of information for analyzing financialstatements. MD&A is measured by the quality of disclosure and there are many previous studies on the usefulness of disclosure information. Therefore, it is very important for the financial analyst who is the representative information user group in the capital market that MD&A Disclosure Quality is measured in real-time in combination with IT information technology and provided timely to financial analyst. In this study, we propose a method that real-time data is converted to digitalized data by combining MD&A disclosure with IT information technology and provided to financial analyst's information environment in real-time. The real-time information provided by MD&A can help the financial analysts' activities and reduce information asymmetry.

Nonfinancial Information and Audit Efforts: Evidence from Management Discussion and Analysis (MD&A) Quality (비재무적 정보와 감사수준 : 경영진단의견서(MD&A) 공시품질에 관한 연구)

  • Ha-Yeon, Park;Cheong Kyu, Park
    • Journal of Korean Society for Quality Management
    • /
    • v.50 no.4
    • /
    • pp.735-749
    • /
    • 2022
  • Purpose: The purpose of this study is to investigate whether the Management Discussion and Analysis (MD&A) has an impact on auditors' audit efforts. MD&A is a means of disclosure that provides information about a company from the management's perspective in financial reporting. The MD&A is a standardized format of nonfinancial information that can be useful for the stake-holders. The auditors have incentives to utilize the nonfinancial information contained in the MD&A for their decision-making. We posit that the MD&A disclosure quality is associated with the level of audit efforts. Methods: We hand-collect the disclosure data from the Financial Supervisory Service of Korea (the Korean SEC). Results: By employing two measures of audit efforts, we document evidence that the quality of MD&A is associated with both audit hours and audit fees. Conclusion: It implies that the auditors perform intensive audit work for companies with high-quality disclosure of MD&A. The study contributes to the literature by providing the first approach to examine the association between the MD&A disclosure and audit efforts.

Relationship between mesiodistal width and enamel thickness in mandibular incisors (하악 절치 근원심폭경과 법랑질 두께의 관계)

  • Han, Uk;Gang, Sung-Nam;Lim, Sung-Hoon
    • The korean journal of orthodontics
    • /
    • v.41 no.3
    • /
    • pp.184-190
    • /
    • 2011
  • Objective: The purpose of this study was to investigate the relationship between the enamel thickness of proximal surfaces and the morphologic features of mandibular incisors. Methods: Mesiodistal/faciolingual (MD/FL) index, MD width, and height of contour width/cervical width ratio were measured in 40 incisors extracted from Koreans. For determining the height of contour width/cervical width ratio, the cervical width was measured as the distance between proximal cementoenamel junctions. Then, the labial surface was ground to the height of the contour level to measure enamel thickness. Pearson correlation analysis was used to investigate the correlation between enamel thickness and morphologic features. Results: Enamel thickness was $0.75{\pm}0.07mm$ per side, and MD width was $5.56{\pm}0.40mm$. Enamel thickness and MD width were significantly correlated. However, a significant relationship was not observed between enamel thickness and MD/FL index or the height of contour width/cervical width ratio. Conclusions: The results suggest that enamel thickness is affected only by MD width. Therefore, if the MD width is the same for mandibular incisors with a large MD/FL index or triangular shape and mandibular incisors with normal shape, then the limit of enamel reduction for reproximation will be the same.

Improved Key-Recovery Attacks on HMAC/NMAC-MD4 (HMAC/NMAC-MD4에 대한 향상된 키 복구 공격)

  • Kang, Jin-Keon;Lee, Je-Sang;Sung, Jae-Chul;Hong, Seok-Hie;Ryu, Heui-Su
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.63-74
    • /
    • 2009
  • In 2005, Wang et al. discovered devastating collision attacks on the main hash functions from the MD4 family. After the discovery of Wang, many analysis results on the security of existing hash-based cryptographic schemes are presented. At CRYPTO'07, Fouque, Leurent and Nguyen presented full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5[4]. Such attacks are based on collision attacks on the underlying hash function, and the most expensive stage is the recovery of the outer key. At EUROCRYPT'08, Wang, Ohta and Kunihiro presented improved outer key recovery attack on HMAC/NMAC-MD4, by using a new near collision path with a high probability[2]. This improves the complexity of the full key-recovery attack on HMAC/NMAC-MD4 which proposed by Fouque, Leurent and Nguyen at CRYPTO'07: The MAC queries decreases from $2^{88}$ to $2^{72}$, and the number of MD4 computations decreases from $2^{95}$ to $2^{77}$. In this paper, we propose improved outer key-recovery attack on HMAC/NMAC-MD4 with $2^{77.1246}$ MAC queries and $2^{37}$ MD4 computations, by using divide and conquer paradigm.

An Assignment Method of Multidimensional Type Inheritance Indexes for XML Query Processing (XML 질의처리를 위한 다차원 타입상속 색인구조의 할당기법)

  • Lee, Jong-Hak
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.1
    • /
    • pp.1-15
    • /
    • 2009
  • This paper presents an assignment method of the multidimensional type inheritance indexes (MD-TIXs) to support the processing of XML queries in XML databases. MD-TIX uses a multidimensional index structure for efficiently supporting nested predicates that involve both nested element and type inheritance hierarchies. In this paper, we have analyzed the strategy of the query processing by using the MD-TIXs, and presented an assignment method of the MD-TIXs in the framework of complex queries, containing conjunctions of nested predicates, each one involving an Xpath having target types or domain types substitution. We first consider MD-TIX operations caused by updating of XML data-bases, and the use of the MD-TIXs in the case of a query containing a single nested predicate. And then, we consider the assignments of the MD-TIXs in the framework of more general queries containing nested predicates over overlapping paths that have common subpaths.

  • PDF

A NOTE ON PRÜFER SEMISTAR MULTIPLICATION DOMAINS

  • Picozza, Giampaolo
    • Journal of the Korean Mathematical Society
    • /
    • v.46 no.6
    • /
    • pp.1179-1192
    • /
    • 2009
  • In this note we give a new generalization of the notions of $Pr{\ddot{U}}fer$ domain and PvMD which uses quasi semistar invertibility, the "quasi P$\star$MD", and compare them with the P$\star$MD. We show in particular that the problem of when a quasi P$\star$MD is a P$\star$MD is strictly related to the problem of the descent to subrings of the P$\star$MD property and we give necessary and sufficient conditions.

Calculations of the Thermal Expansion Coefficient for Rock-Forming Minerals Using Molecular Dynamics (MD) Simulation (분자동역학(MD) 시뮬레이션을 이용한 조암광물의 열팽창 계수 산정)

  • 서용석;배규진
    • The Journal of Engineering Geology
    • /
    • v.11 no.3
    • /
    • pp.269-278
    • /
    • 2001
  • We describe the calculation of thermal expansion coefficients of $\alpha$-quartz, muscovite and albite using a MD simulation method. The selection of interatomic potentials is important for the MD calculation, and we used the 2-body interatomic potential function. The coefficients are calculated using a differential operation of the temperature dependence of the lattice constant obtained from the NPT-ensemble molecular dynamics simulation. Reasonable agreement is found between the analytical results and measured data.

  • PDF

A study on the Applicability of Software International Standards for SaMD's Cybersecurity Regulation (SaMD의 사이버보안 규제에 대한 소프트웨어 국제표준의 적용 가능성에 대한 연구)

  • Lee Young Kim;Youngjoo Chung;Gyu Ha Ryu;Baek Hwan Cho
    • Journal of Information Technology Services
    • /
    • v.22 no.4
    • /
    • pp.21-35
    • /
    • 2023
  • Software as Medical Devices (SaMD) is a growing category of medical devices that are composed of software to perform one or more medical purposes. SaMD is less likely to cause physical harm compared to conventional medical devices, particularly medical electrical equipments, and may be more vulnerable to privacy issues. This difference was acknowledged and resulted in introducing new regulation guidance specifically for cybersecurity of SaMD. It guides stakeholders of SaMD what to consider in what context in terms of cybersecurity. This study examines the current guidance of how cybersecurity is considered for SaMD by analyzing current medical device standards, then suggest which concept or details beyond current medical device standards may be applicable through analysis of international standards documents published for software in general.