Results 81 to 90 of about 1,611 (184)
Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs
We devise the first closed formula for the number of rounds of a blockcipher with secret components so that these components can be revealed using multiset, algebraic-degree, or division-integral properties, which in this case are equivalent.
Alex Biryukov +2 more
doaj +1 more source
ABSTRACT On April 6, 2009, central Italy was hit by a Mw6.1$$ {M}_w\kern0.3em 6.1 $$ earthquake that caused 308 victims in the city and province of L'Aquila; subsequently, in 2016, two Mw6+$$ {M}_w\kern0.3em 6+ $$ shocks were recorded in an area located a few dozen kilometers further north, respectively in Amatrice and Norcia.
Elisa Varini +2 more
wiley +1 more source
Single Trace Side Channel Analysis on NTRU Implementation
As researches on the quantum computer have progressed immensely, interests in post-quantum cryptography have greatly increased. NTRU is one of the well-known algorithms due to its practical key sizes and fast performance along with the resistance against
Soojung An +4 more
doaj +1 more source
News shocks, consumer confidence and business cycles
Abstract We study the causal effects of consumer sentiment shocks on macroeconomic aggregates. By constructing a novel instrument based on major non‐economic news shocks in the USA over 1969–2022, and opinion polls around these events, we identify exogenous changes in consumer confidence.
Syed M. Hussain, Zara Liaqat
wiley +1 more source
Cryptanalysis of the shifted conjugacy authentication protocol
In this paper we present the first practical attack on the shifted conjugacy-based authentication protocol proposed by P. Dehornoy in [P. Dehornoy, Using shifted conjugacy in braid-based cryptography, Algebraic Methods in Cryptography, Contemporary ...
Longrigg Jonathan, Ushakov Alexander
doaj +1 more source
Abstract We establish the connection between the Steinitz problem for ordering vector families in arbitrary norms and its variant for not necessarily zero‐sum families consisting of “nearly unit” vectors.
Gergely Ambrus, Rainie Heck
wiley +1 more source
Algebraic Adversarial Attacks on Integrated Gradients
Adversarial attacks on explainability models have drastic consequences when explanations are used to understand the reasoning of neural networks in safety critical systems. Path methods are one such class of attribution methods susceptible to adversarial attacks. Adversarial learning is typically phrased as a constrained optimisation problem.
Simpson, Lachlan +5 more
openaire +2 more sources
ABSTRACT The contribution deals with algebraic multigrid (AMG) based preconditioning methods for the iterative solution of a coupled linear system of equations arising in numerical simulations of failure of quasi‐brittle materials using generalized continuum approaches.
Nasser Alkmim +4 more
wiley +1 more source
Holographic microlithography enables the fabrication of fully connected 3D liquid crystalline structures in a single exposure. The process maintains precise control over the director orientation within the entire object, preventing local director distortions typically observed in sequential printing.
Lovish Gulati +8 more
wiley +1 more source
Unboxing ARX-Based White-Box Ciphers: Chosen-Plaintext Computation Analysis and Its Applications
It has been proven that the white-box ciphers with small encodings will be vulnerable to algebraic and computation attacks. By leveraging the large encodings, the self-equivalence and implicit implementations are proposed for ARXbased white-box ciphers.
Yufeng Tang +4 more
doaj +1 more source

