Results 61 to 70 of about 1,611 (184)
Algebraic and Slide Attacks on KeeLoq [PDF]
KeeLoq is a block cipher used in wireless devices that unlock the doors and alarms in cars manufactured by Chrysler, Daewoo, Fiat, GM, Honda, Jaguar, Toyota, Volvo, Volkswagen, etc [8,9,33,34]. KeeLoq is inexpensive to implement and economical in gate count, yet according to Microchip [33] it should have "a level of security comparable to DES".
Nicolas T. Courtois +2 more
openaire +1 more source
In moderately hole‐doped Sr1−xKxFe2As2${\rm Sr}_{1-x}{\rm K}_x{\rm Fe}_2{\rm As}_2$ system the pairing state is s+−${\rm s}^{+-}$ wave pairing state mediated by spin fluctuations. As the SDW order parameter increases, TC${\rm T}_C$ decreases and TM${\rm T}_M$ increases. As temperature increases, the SDW order parameter decreases and vanishes at TM${\rm
Gedefaw Mebratie +2 more
wiley +1 more source
ABSTRACT The analysis of certain properties of the underlying graph of a public transport network generates insights about the network's structure. Hereby, the choice of the graph representation depends on a trade‐off between complexity reduction and information preservation to adequately model a public transport network.
Michael Palk +2 more
wiley +1 more source
Initial State Privacy of Nonlinear Systems on Riemannian Manifolds
ABSTRACT In this paper, we investigate initial state privacy protection for discrete‐time nonlinear closed systems. By capturing Riemannian geometric structures inherent in such privacy challenges, we refine the concept of differential privacy through the introduction of an initial state adjacency set based on Riemannian distances.
Le Liu, Yu Kawano, Antai Xie, Ming Cao
wiley +1 more source
Hydrogen‐based direct reduced iron (H‐DRI) melts differently from scrap and carbon‐bearing DRI. This work combines differential scanning calorimetry experiments, FactSage thermodynamics, and simple composition‐based regression to predict solidus, liquidus, heat capacity, and enthalpy for H‐DRI.
Ankur Agnihotri +3 more
wiley +1 more source
WSN key recovery attack based on symmetric matrix decomposition
The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key ...
Xiangmin JI +5 more
doaj +2 more sources
Abstract This study examines the adaptive market hypothesis in the prewar and wartime Japanese stock market using a new market capitalization‐weighted price index. First, we find that the degree of market efficiency varies over time and with major historical events. This implies that the hypothesis is supported in this market.
Kenichi Hirayama, Akihiko Noda
wiley +1 more source
Why did Putin invade Ukraine? A theory of degenerate autocracy
Abstract Many dictatorships end up with a series of disastrous decisions such as Hitler's attack on the Soviet Union or Saddam Hussein's aggression against Kuwait. Even if a certain policy choice is not ultimately fatal for the regime, such as Mao's Big Leap Forward or the Pol Pot's collectivization drive, they typically involve both a miscalculation ...
Georgy Egorov, Konstantin Sonin
wiley +1 more source
Attack Tree Metrics are Operad Algebras
Attack Trees (ATs) are a widely used tool for security analysis. ATs can be employed in quantitative security analysis through metrics, which assign a security value to an AT. Many different AT metrics exist, and there exist multiple general definitions that aim to study a wide variety of AT metrics at once.
openaire +3 more sources
ABSTRACT Lucid dreaming, defined as the experience of becoming aware of dreaming while dreaming, offers a unique window into a state of consciousness characterised by a blending of the sensory vividness of REM sleep with the self‐awareness of wakefulness. While past functional imaging has shed light on the neural activity supporting lucid dreaming, the
Nicola De Pisapia +4 more
wiley +1 more source

