Results 101 to 110 of about 1,200 (188)
Abstract Seismic ruptures that extend over kilometers along faults originate in shear zones only millimeters thick. We present a hybrid numerical framework coupling the spectral boundary integral method (SBIM) for the poroelastic bulk with a staggered‐grid finite difference method (FDM) for the fault gouge.
Yu‐Han Wang, Elías Rafn Heimisson
wiley +1 more source
A new S-box pattern generation based on chaotic enhanced logistic map: case of 5-bit S-box
Cryptography plays consistently an essential role in securing any sort of communications or data broadcast over the network. Since the security of any designed block cipher algorithm is related to its Substitution box (S-box), several efforts have been ...
Ismail El Gaabouri +3 more
doaj +1 more source
ABSTRACT Music and language are both hierarchically structured: syllables combine into words, and meters are groupings of musical beats. Statistical learning (SL) supports speech segmentation through computation of transitional probabilities between syllables, and individual differences in SL ability were found predictive of further language ...
Iris van der Wulp +2 more
wiley +1 more source
This article reviews and compares popular methods, some old and some recent, that produce time series having Poisson marginal distributions. The article begins by narrating ways where time series with Poisson marginal distributions can be produced.
Jiajie Kong, Robert Lund
wiley +1 more source
Abstract Heilbronn's triangle problem is a classical question in discrete geometry. It asks to determine the smallest number Δ=Δ(N)$\Delta = \Delta (N)$ for which every collection in N$N$ points in the unit square spans a triangle with area at most Δ$\Delta$.
Dmitrii Zakharov
wiley +1 more source
Quantization of infinitesimal braidings and pre‐Cartier quasi‐bialgebras
Abstract In this paper, we extend Cartier's deformation theorem of braided monoidal categories admitting an infinitesimal braiding to the nonsymmetric case. The algebraic counterpart of these categories is the notion of a pre‐Cartier quasi‐bialgebra, which extends the well‐known notion of quasi‐triangular quasi‐bialgebra given by Drinfeld.
Chiara Esposito +3 more
wiley +1 more source
Algebraic Side-Channel Attack on Twofish
While algebraic side-channel attack (ASCA) has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling.
Chujiao Ma, John Chandy, Zhijie Shi
openaire +1 more source
Abstract figure legend We have developed a computational model of energy metabolism in fast‐twitch oxidative glycolytic muscle fibres. The model considers thermodynamically constrained enzyme kinetics derived from in vitro data and was validated against in vivo data from phosphorus magnetic resonance spectroscopy.
Jana Disch +4 more
wiley +1 more source
Algebraic Adversarial Attacks on Explainability Models
Classical adversarial attacks are phrased as a constrained optimisation problem. Despite the efficacy of a constrained optimisation approach to adversarial attacks, one cannot trace how an adversarial point was generated. In this work, we propose an algebraic approach to adversarial attacks and study the conditions under which one can generate ...
Simpson, Lachlan +5 more
openaire +2 more sources
Research of Hamming weight-based algebraic side-channel attack on LED
:The security of LED against the algebraic side-channel attack (ASCA)was evaluated, which is a lightweight block cipher proposed in CHES 2011.Firstly, the attack model of ASCA was analyzed, and then the design and algebraic representations of LED were ...
Ke-ke JI +4 more
doaj

