Results 101 to 110 of about 1,782,571 (254)

Breaking Neural Networks Through Algebraic Lens: A Preliminary Analysis of Mathematical Vulnerabilities in AI Architectures

open access: yesIEEE Access
Modern deep neural networks, particularly transformer architectures, have achieved unprecedented performance across various domains through sophisticated mathematical structures that remain incompletely understood from a security perspective.
Sandeep Gupta   +3 more
doaj   +1 more source

Why did Putin invade Ukraine? A theory of degenerate autocracy

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract Many dictatorships end up with a series of disastrous decisions such as Hitler's attack on the Soviet Union or Saddam Hussein's aggression against Kuwait. Even if a certain policy choice is not ultimately fatal for the regime, such as Mao's Big Leap Forward or the Pol Pot's collectivization drive, they typically involve both a miscalculation ...
Georgy Egorov, Konstantin Sonin
wiley   +1 more source

Analysis of an Optimal Fault Attack on the LED-64 Lightweight Cryptosystem

open access: yesIEEE Access, 2019
This paper presents an optimal method for recovering the secret keys of the light encryption device (LED) by combining the impossible differential fault attack with the algebraic differential fault attack. The proposed optimal method effectively improves
Liang Dong   +5 more
doaj   +1 more source

A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes [PDF]

open access: yes, 2012
Bogdanov and Lee suggested a homomorphic public-key encryption scheme based on error correcting codes. The underlying public code is a modified Reed-Solomon code obtained from inserting a zero submatrix in the Vandermonde generating matrix defining it ...
Gauthier, Valérie   +2 more
core   +2 more sources

State recovery attack on ACORN v3 in nonce-reuse setting

open access: yesTongxin xuebao, 2020
Based on differential-algebraic method and guess-and-determine technique,the state recovery attack of ACORN v3 was presented when one pair of key and Nonce was used to encrypt two messages.The time complexity of the attack was 2122.5c,where c was the ...
Guoshuang ZHANG   +3 more
doaj   +2 more sources

Random Permutation Statistics and An Improved Slide-Determine Attack on KeeLoq [PDF]

open access: yes, 2011
KeeLoq is a lightweight block cipher which is extensively used in the automotive industry. Its periodic structure, and overall simplicity makes it vulnerable to many different attacks.
Bard, GV, Courtois, NT
core  

Lucid Dreaming Frequency Associated With Grey–White Matter Networks: An Exploratory Multimodal MRI Study

open access: yesJournal of Sleep Research, EarlyView.
ABSTRACT Lucid dreaming, defined as the experience of becoming aware of dreaming while dreaming, offers a unique window into a state of consciousness characterised by a blending of the sensory vividness of REM sleep with the self‐awareness of wakefulness. While past functional imaging has shed light on the neural activity supporting lucid dreaming, the
Nicola De Pisapia   +4 more
wiley   +1 more source

Effective When Distinctive: The Role of Phonetic Similarity in Nested Dependency Learning Across Preschool Years

open access: yesLanguage Learning, EarlyView.
Abstract Parallel tracking of distant relations between speech elements, so‐called nonadjacent dependencies (NADs), is crucial in language development but computationally demanding and acquired only in late preschool years. As processing of single NADs is facilitated when dependent elements are perceptually similar, we investigated how phonetic ...
Dimitra‐Maria Kandia   +3 more
wiley   +1 more source

Navigating Supply Shocks: Sector Resilience and Production Prices Through Stochastic Input–Output Modeling

open access: yesMathematical Finance, EarlyView.
ABSTRACT This study develops a novel multivariate stochastic framework for assessing systemic risks, such as climate and nature‐related shocks, within production or financial networks. By embedding a linear stochastic fluid network, interpretable as a generalized vector Ornstein–Uhlenbeck process, into the production network of interdependent ...
Giovanni Amici   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy