Results 11 to 20 of about 1,097 (148)
Abstract This study explored the validity of person judgements by targets and their acquaintances (‘informants’) in longitudinally predicting a broad range of psychologically meaningful life experiences. Judgements were gathered from four sources (targets, N = 189; and three types of informants, N = 1352), and their relative predictive validity was ...
Nele M. Wessels +3 more
wiley +1 more source
Computing the Algebraic Immunity Efficiently [PDF]
The purpose of algebraic attacks on stream and block ciphers is to recover the secret key by solving an overdefined system of multivariate algebraic equations. They become very efficient if this system is of low degree. In particular, they have been used to break stream ciphers immune to all previously known attacks.
Frédéric Didier, Jean-Pierre Tillich
openaire +1 more source
Algebraic immunity of Boolean function [PDF]
Алгебраический метод криптоанализа, основанный на решении систем уравнений над конечным полем, является одним из современных методов криптоанализа, широко применяющихся в процессе оценки стойкости поточного алгоритма шифрования. На практике в составе большинства поточных алгоритмов шифрования в качестве основных преобразований применяются булевы ...
openaire +1 more source
In this paper, we discuss the effect of the cryptographic properties of translation transformation rotation symmetric Boolean functions. On construction of rotation symmetric Boolean functions with the optimal algebraic immunity, we construct correlation
Huang Jinglian
doaj +1 more source
An algorithm for constructing S-boxes for block symmetric encryption
This article presents an algorithm for the generation of S-boxes with the maximum algebraic immunity and high nonlinearity. The algorithm is founded method of the permutation of output element of S-box. On basis of the proposed method, $S(8\times 8)$-box
Alijon Bozorbayevicha Sattarov +1 more
doaj +1 more source
Robustness of modern information confidentiality algorithm depends on its individual components. Modern block ciphers highly depend on two components namely confusion and diffusion.
Nabilah Abughazalah +2 more
doaj +1 more source
A Substitution Box for Lightweight Ciphers to Secure Internet of Things
The Internet of Things is a resource-constrained device that demands lightweight cryptographic solutions to achieve high performance and optimal security.
V. Panchami, Mahima Mary Mathews
doaj +1 more source
Long-term trends of epibionts reflect Mediterranean striped dolphin abundance shifts caused by morbillivirus epidemics. [PDF]
This original research piece demonstrates, through empirical and theoretical modelling approaches, that the epibionts of striped dolphins indicate dolphin abundance shifts caused by epidemics of dolphin morbillivirus (DMV). In addition, we provide the first SIR model to investigate the epidemiology of DMV in western Mediterranean striped dolphins ...
Ten S +4 more
europepmc +2 more sources
Constructing Higher Nonlinear Odd-Variable RSBFs With Optimal AI and Almost Optimal FAI
Rotation symmetric Boolean functions (RSBFs) are nowadays studied a lot because of its easy operations and good performance in cryptosystem. This paper constructs a new class of odd-variable RSBFs with optimal algebraic immunity (AI). The nonlinearity of
Yindong Chen +5 more
doaj +1 more source
Fast Algebraic Immunity of
Boolean functions should possess high fast algebraic immunity (FAI) when it is used in stream ciphers in order to stand up to fast algebraic attacks. However, in previous research, the FAI of Boolean functions was usually calculated by computer.
Yindong Chen +3 more
doaj +1 more source

