Results 111 to 120 of about 1,782,571 (254)
Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs
We devise the first closed formula for the number of rounds of a blockcipher with secret components so that these components can be revealed using multiset, algebraic-degree, or division-integral properties, which in this case are equivalent.
Alex Biryukov +2 more
doaj +1 more source
ABSTRACT The paper examines the financial balances of the US economy. Government is the main borrower and households and the foreign sector the main lenders. Business net lending is minimal. The balances and their underlying transactions contradict the loanable funds theory and its “global savings glut” variation.
Michalis Nikiforos, Lance Taylor
wiley +1 more source
Single Trace Side Channel Analysis on NTRU Implementation
As researches on the quantum computer have progressed immensely, interests in post-quantum cryptography have greatly increased. NTRU is one of the well-known algorithms due to its practical key sizes and fast performance along with the resistance against
Soojung An +4 more
doaj +1 more source
A Distinguisher-Based Attack on a Variant of McEliece's Cryptosystem Based on Reed-Solomon Codes
Baldi et \textit{al.} proposed a variant of McEliece's cryptosystem. The main idea is to replace its permutation matrix by adding to it a rank 1 matrix.
Gauthier, Valérie +2 more
core +1 more source
Cryptanalysis of the shifted conjugacy authentication protocol
In this paper we present the first practical attack on the shifted conjugacy-based authentication protocol proposed by P. Dehornoy in [P. Dehornoy, Using shifted conjugacy in braid-based cryptography, Algebraic Methods in Cryptography, Contemporary ...
Longrigg Jonathan, Ushakov Alexander
doaj +1 more source
How to Match Cognitive Model Predictions With EEG Data
Abstract Reliably identifying relevant brain areas implicated by the simulated activity from cognitive models is still an unsolved problem for cognitive modeling, particularly when matching model output with human electroencephalography (EEG) data. We propose a new method involving postprocessing of ACT‐R module activity and clustered EEG component ...
Kai Preuss +3 more
wiley +1 more source
Algebraic Adversarial Attacks on Integrated Gradients
Adversarial attacks on explainability models have drastic consequences when explanations are used to understand the reasoning of neural networks in safety critical systems. Path methods are one such class of attribution methods susceptible to adversarial attacks. Adversarial learning is typically phrased as a constrained optimisation problem.
Simpson, Lachlan +5 more
openaire +2 more sources
Abstract figure legend Schematic overview of the experimental and computational framework for investigating hiPSC‐CM electrophysiology with MEA systems. The MEA‐based model integrates experimental data with phenotype‐specific ionic models and tissue‐level heterogeneity.
Sofia Botti +2 more
wiley +1 more source
ABSTRACT Building on a quartz crystal microbalance with dissipation monitoring (QCM‐D), fouling in emulsion polymerization was compared between acrylate dispersions stabilized with a mobile, anionic surfactant and dispersions of poly(vinyl acetate‐co‐vinyl neodecanoate), PVAc, stabilized with polyvinyl alcohol, PVOH.
K. M. Hoffmann +5 more
wiley +1 more source
Unboxing ARX-Based White-Box Ciphers: Chosen-Plaintext Computation Analysis and Its Applications
It has been proven that the white-box ciphers with small encodings will be vulnerable to algebraic and computation attacks. By leveraging the large encodings, the self-equivalence and implicit implementations are proposed for ARXbased white-box ciphers.
Yufeng Tang +4 more
doaj +1 more source

