Results 81 to 90 of about 1,611 (184)

Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We devise the first closed formula for the number of rounds of a blockcipher with secret components so that these components can be revealed using multiset, algebraic-degree, or division-integral properties, which in this case are equivalent.
Alex Biryukov   +2 more
doaj   +1 more source

What Seismic Phase is L'Aquila in Fifteen Years After the Mw6.1$$ {M}_w\kern0.3em 6.1 $$ Earthquake of April 6, 2009?

open access: yesEnvironmetrics, Volume 37, Issue 3, April 2026.
ABSTRACT On April 6, 2009, central Italy was hit by a Mw6.1$$ {M}_w\kern0.3em 6.1 $$ earthquake that caused 308 victims in the city and province of L'Aquila; subsequently, in 2016, two Mw6+$$ {M}_w\kern0.3em 6+ $$ shocks were recorded in an area located a few dozen kilometers further north, respectively in Amatrice and Norcia.
Elisa Varini   +2 more
wiley   +1 more source

Single Trace Side Channel Analysis on NTRU Implementation

open access: yesApplied Sciences, 2018
As researches on the quantum computer have progressed immensely, interests in post-quantum cryptography have greatly increased. NTRU is one of the well-known algorithms due to its practical key sizes and fast performance along with the resistance against
Soojung An   +4 more
doaj   +1 more source

News shocks, consumer confidence and business cycles

open access: yesEconomica, Volume 93, Issue 370, Page 648-676, April 2026.
Abstract We study the causal effects of consumer sentiment shocks on macroeconomic aggregates. By constructing a novel instrument based on major non‐economic news shocks in the USA over 1969–2022, and opinion polls around these events, we identify exogenous changes in consumer confidence.
Syed M. Hussain, Zara Liaqat
wiley   +1 more source

Cryptanalysis of the shifted conjugacy authentication protocol

open access: yesJournal of Mathematical Cryptology, 2008
In this paper we present the first practical attack on the shifted conjugacy-based authentication protocol proposed by P. Dehornoy in [P. Dehornoy, Using shifted conjugacy in braid-based cryptography, Algebraic Methods in Cryptography, Contemporary ...
Longrigg Jonathan, Ushakov Alexander
doaj   +1 more source

A note on the Steinitz lemma

open access: yesMathematika, Volume 72, Issue 2, April 2026.
Abstract We establish the connection between the Steinitz problem for ordering vector families in arbitrary norms and its variant for not necessarily zero‐sum families consisting of “nearly unit” vectors.
Gergely Ambrus, Rainie Heck
wiley   +1 more source

Algebraic Adversarial Attacks on Integrated Gradients

open access: yes2024 International Conference on Machine Learning and Cybernetics (ICMLC)
Adversarial attacks on explainability models have drastic consequences when explanations are used to understand the reasoning of neural networks in safety critical systems. Path methods are one such class of attribution methods susceptible to adversarial attacks. Adversarial learning is typically phrased as a constrained optimisation problem.
Simpson, Lachlan   +5 more
openaire   +2 more sources

Algebraic Multigrid Based Preconditioning Approaches for Generalized Continuum Models and Indirect Displacement Control Techniques

open access: yesInternational Journal for Numerical Methods in Engineering, Volume 127, Issue 6, 30 March 2026.
ABSTRACT The contribution deals with algebraic multigrid (AMG) based preconditioning methods for the iterative solution of a coupled linear system of equations arising in numerical simulations of failure of quasi‐brittle materials using generalized continuum approaches.
Nasser Alkmim   +4 more
wiley   +1 more source

Holographic Whole‐Object Photopolymerization Preserving Director Alignment in Liquid Crystalline Actuators

open access: yesAdvanced Materials, Volume 38, Issue 13, 3 March 2026.
Holographic microlithography enables the fabrication of fully connected 3D liquid crystalline structures in a single exposure. The process maintains precise control over the director orientation within the entire object, preventing local director distortions typically observed in sequential printing.
Lovish Gulati   +8 more
wiley   +1 more source

Unboxing ARX-Based White-Box Ciphers: Chosen-Plaintext Computation Analysis and Its Applications

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
It has been proven that the white-box ciphers with small encodings will be vulnerable to algebraic and computation attacks. By leveraging the large encodings, the self-equivalence and implicit implementations are proposed for ARXbased white-box ciphers.
Yufeng Tang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy