Results 71 to 80 of about 1,782,571 (254)
Protecting Obfuscation against Algebraic Attacks [PDF]
Recently, Garg, Gentry, Halevi, Raykova, Sahai, and Waters (FOCS 2013) constructed a general-purpose obfuscating compiler for NC1 circuits. We describe a simplified variant of this compiler, and prove that it is a virtual black box obfuscator in a generic multilinear map model.
Boaz Barak +4 more
openaire +1 more source
Abstract In the classroom, metabolism is often approached and received as a mundane exercise in memorization. Teaching metabolism also faces the challenge of negative perceptions that can impede learning. We sought to improve the learning experience in an undergraduate lecture course on microbial metabolism by implementing an illustrated story that ...
James B. McKinlay, Katherine Kearns
wiley +1 more source
Optimal model‐based design of experiments for parameter precision: Supercritical extraction case
Abstract This study investigates the process of chamomile oil extraction from flowers. A parameter‐distributed model consisting of a set of partial differential equations is used to describe the governing mass transfer phenomena in a cylindrical packed bed with solid chamomile particles under supercritical conditions using carbon dioxide as a solvent ...
Oliwer Sliczniuk, Pekka Oinas
wiley +1 more source
Variations of the McEliece Cryptosystem
Two variations of the McEliece cryptosystem are presented. The first one is based on a relaxation of the column permutation in the classical McEliece scrambling process.
Alain Couvreur +16 more
core +1 more source
Cong Fu et al. demonstrate that glymphatic system dysfunction is linked to enhanced inhibitory cortical activity using diffusion MRI and EEG. These findings highlight a mechanistic link between perivascular fluid dynamics and neuronal activity, suggesting a role for glymphatic function in maintaining cortical stability in epilepsy.
Cong Fu +11 more
wiley +1 more source
Research of Hamming weight-based algebraic side-channel attack on LED
:The security of LED against the algebraic side-channel attack (ASCA)was evaluated, which is a lightweight block cipher proposed in CHES 2011.Firstly, the attack model of ASCA was analyzed, and then the design and algebraic representations of LED were ...
Ke-ke JI +4 more
doaj +2 more sources
Discrimination in a General Algebraic Setting
Discriminating groups were introduced by G. Baumslag, A. Myasnikov, and V. Remeslennikov as an outgrowth of their theory of algebraic geometry over groups.
Benjamin Fine +3 more
doaj +1 more source
Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE [PDF]
Lattice based encryption schemes and linear code based encryption schemes have received extensive attention in recent years since they have been considered as post-quantum candidate encryption schemes.
Wang, Yongge
core +2 more sources
Improving Implied Volatility Forecasts for American Options Using Neural Networks
ABSTRACT This paper explores the application of neural networks to improve pricing of American options. Focusing on both American and European options on the S&P 100 index from January 2016 to August 2023, we integrate neural networks to model the difference between market‐implied and model‐implied volatilities derived from the Black‐Scholes and Heston
Haitong Jiang, Emese Lazar, Miriam Marra
wiley +1 more source
ABSTRACT Porous gas bearings (PGBs) enable high‐speed, oil‐free operation in modern rotating machinery. This study develops a coupled thermo‐hydrodynamic (THD) model for a cylindrical porous gas bearing lubricated with four working fluids—air, R‐134a, helium and hydrogen.
S. Bechiri, B. Bouchehit, B. Bou‐Saïd
wiley +1 more source

