Results 11 to 20 of about 1,097 (148)

Who Knows Best What the Next Year Will Hold for You? The Validity of Direct and Personality‐based Predictions of Future Life Experiences Across Different Perceivers

open access: yesEuropean Journal of Personality, EarlyView., 2020
Abstract This study explored the validity of person judgements by targets and their acquaintances (‘informants’) in longitudinally predicting a broad range of psychologically meaningful life experiences. Judgements were gathered from four sources (targets, N = 189; and three types of informants, N = 1352), and their relative predictive validity was ...
Nele M. Wessels   +3 more
wiley   +1 more source

Computing the Algebraic Immunity Efficiently [PDF]

open access: yes, 2006
The purpose of algebraic attacks on stream and block ciphers is to recover the secret key by solving an overdefined system of multivariate algebraic equations. They become very efficient if this system is of low degree. In particular, they have been used to break stream ciphers immune to all previously known attacks.
Frédéric Didier, Jean-Pierre Tillich
openaire   +1 more source

Algebraic immunity of Boolean function [PDF]

open access: yesВычислительные технологии, 2019
Алгебраический метод криптоанализа, основанный на решении систем уравнений над конечным полем, является одним из современных методов криптоанализа, широко применяющихся в процессе оценки стойкости поточного алгоритма шифрования. На практике в составе большинства поточных алгоритмов шифрования в качестве основных преобразований применяются булевы ...
openaire   +1 more source

Construction of the optimal algebraic immunity Boolean functions with correlation immunity from transformation RSBFs

open access: yesMATEC Web of Conferences, 2016
In this paper, we discuss the effect of the cryptographic properties of translation transformation rotation symmetric Boolean functions. On construction of rotation symmetric Boolean functions with the optimal algebraic immunity, we construct correlation
Huang Jinglian
doaj   +1 more source

An algorithm for constructing S-boxes for block symmetric encryption

open access: yesUniversal Journal of Mathematics and Applications, 2018
This article presents an algorithm for the generation of S-boxes with the maximum algebraic immunity and high nonlinearity. The algorithm is founded method of the permutation of output element of S-box. On basis of the proposed method, $S(8\times 8)$-box
Alijon Bozorbayevicha Sattarov   +1 more
doaj   +1 more source

Hybrid multi-criteria decision-making technique for the selection of best cryptographic multivalued Boolean function

open access: yesComplex & Intelligent Systems, 2023
Robustness of modern information confidentiality algorithm depends on its individual components. Modern block ciphers highly depend on two components namely confusion and diffusion.
Nabilah Abughazalah   +2 more
doaj   +1 more source

A Substitution Box for Lightweight Ciphers to Secure Internet of Things

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
The Internet of Things is a resource-constrained device that demands lightweight cryptographic solutions to achieve high performance and optimal security.
V. Panchami, Mahima Mary Mathews
doaj   +1 more source

Long-term trends of epibionts reflect Mediterranean striped dolphin abundance shifts caused by morbillivirus epidemics. [PDF]

open access: yesJ Anim Ecol
This original research piece demonstrates, through empirical and theoretical modelling approaches, that the epibionts of striped dolphins indicate dolphin abundance shifts caused by epidemics of dolphin morbillivirus (DMV). In addition, we provide the first SIR model to investigate the epidemiology of DMV in western Mediterranean striped dolphins ...
Ten S   +4 more
europepmc   +2 more sources

Constructing Higher Nonlinear Odd-Variable RSBFs With Optimal AI and Almost Optimal FAI

open access: yesIEEE Access, 2019
Rotation symmetric Boolean functions (RSBFs) are nowadays studied a lot because of its easy operations and good performance in cryptosystem. This paper constructs a new class of odd-variable RSBFs with optimal algebraic immunity (AI). The nonlinearity of
Yindong Chen   +5 more
doaj   +1 more source

Fast Algebraic Immunity of $2^m+2$ & $2^m+3$ Variables Majority Function

open access: yesIEEE Access, 2019
Boolean functions should possess high fast algebraic immunity (FAI) when it is used in stream ciphers in order to stand up to fast algebraic attacks. However, in previous research, the FAI of Boolean functions was usually calculated by computer.
Yindong Chen   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy