Results 81 to 90 of about 9,006 (193)

On the notion of gauge symmetries of generic Lagrangian field theory

open access: yes, 2008
General Lagrangian theory of even and odd fields on an arbitrary smooth manifold is considered. Its non-trivial reducible gauge symmetries and their algebra are defined in this very general setting by means of the inverse second Noether theorem.
Giachetta, G.   +2 more
core   +1 more source

Evaluating Ascon Hardware on 7-Series FPGA Devices

open access: yesIEEE Access
The applications regarding the Internet of Things (IoT) demand lightweight and robust cryptographic solutions to ensure authenticated encryption with associated data (AEAD). Also, the lightweight cryptographic solutions that provide data confidentiality,
Adel R. Alharbi   +5 more
doaj   +1 more source

ON THE SECURITY OF AEAD-CRYPTOSYSTEM OF THE GCM TYPE [PDF]

open access: yesPrikladnaya diskretnaya matematika, 2016
Summary: A provable security methodology for the cryptosystems ensuring information privacy and authenticity is discussed. A simplified version of the well-known estimates for the provable security of the AEAD-cryptosystem GCM with an initialization vector of fixed length is proposed.
openaire   +2 more sources

Chromogranin A in the olfactory system of the rat [PDF]

open access: yes, 1990
The olfactory bulb of the rat contains chromogranin A at a similar level as the adrenal gland or the hypophysis as revealed by immunoblots. Olfactory chromogranin A also displays the same size as chromogranin A of endocrine cells.
Baker   +32 more
core   +1 more source

Key Assignment Schemes with Authenticated Encryption, revisited

open access: yesIACR Transactions on Symmetric Cryptology, 2020
A popular cryptographic option to implement Hierarchical Access Control in organizations is to combine a key assignment scheme with a symmetric encryption scheme.
Jeroen Pijnenburg, Bertram Poettering
doaj   +1 more source

Survival Analysis in LGD Modeling [PDF]

open access: yes, 2012
The paper proposes an application of the survival time analysis methodology to estimations of the Loss Given Default (LGD) parameter. The main advantage of the survival analysis approach compared to classical regression methods is that it allows ...
Charamza, Pavel   +2 more
core   +2 more sources

Detection of antibodies to Sendai virus by enzyme-linked immunosorbent assay (ELISA) [PDF]

open access: yes, 1979
An enzyme-linked immunosorbent assay (ELISA) for the detection of antibodies to Sendai virus, a paramyxovirus, is described. The assay was found to be about 20-fold more sensitive than the hemagglutination inhibition assay.
Avrameas   +17 more
core   +1 more source

Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Cryptographic competitions, like the ongoing NIST call for lightweight cryptography, always provide a thriving research environment, where new interesting ideas are proposed and new cryptographic insights are made. One proposal for this NIST call that is
Christoph Dobraunig   +2 more
doaj   +1 more source

Influence of FK 506 (tacrolimus) on circulating CD4 + t cells expressing cd25 and cd45ra antigens in 19 patients with chronic progressive multiple sclerosis participating in an open label drug safety trial [PDF]

open access: yes, 1994
We have taken the opportunity of a clinical trial of the potential efficacy and safety of FK 506 (tacrolimus) in chronic progressive multiple sclerosis (MS) to examine the influence of this potent new immunosuppressant on circulating T-lymphocytes in an ...
A. W. Thomson   +46 more
core   +1 more source

On the Plaintext Awareness of AEAD Schemes

open access: yesIACR Transactions on Symmetric Cryptology
Plaintext-awareness of AEAD schemes is one of the more obscure and easily misunderstood notions. Originally proposed by Andreeva et al., Mennink and Talnikar showed in 2025 that the original definitions are vague and leave too much room for ...
Mario Marhuenda Beltrán   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy