Results 31 to 40 of about 5,382 (233)
Sycon: a new milestone in designing ASCON-like permutations [PDF]
ASCON is one of the elegant designs of authenticated encryption with associated data (AEAD) that was selected as the first choice for lightweight applications in the CAESAR competition, which also has been submitted to NIST lightweight cryptography standardization. ASCON has been in the literature for a while; however, there has been no successful AEAD
Mandal, Kalikinkar +3 more
openaire +1 more source
Variables that intervene in the weight of rotifer biomass and fatty acids
Abstract The biomass of rotifers is used as live food in aquaculture; their quality is determined by the content of the main polyunsaturated fatty acids and the weight it acquires over time. The objective of this work was to evaluate the variables involved in this process to achieve higher quality.
Carla Patricia Aguilar Samanamud +7 more
wiley +1 more source
Time to Upgrade: A New OpenSPIM Guide to Build and Operate Advanced OpenSPIM Configurations
New instructions and guides on how to assemble, configure, and align an X‐OpenSPIM, together with a completely overhauled software plugin (μOpenSPIM), make it easier and less time‐consuming for OpenSPIM users to upgrade to a more advanced OpenSPIM system and use it as a powerful research tool in their laboratories.
Johannes Girstmair +4 more
wiley +1 more source
AEGIS, an authenticated encryption (AE) algorithm designed by H. J. Wu and B. Preneel, is one of the six winners of the Competition for Authenticated Encryption: Security, Applicability, and Robustness, which was launched by the National Institute of Standards and Technology.
Tairong SHI +3 more
wiley +1 more source
Multiple Differential Distinguisher of SIMECK32/64 Based on Deep Learning
Currently, deep learning has provided an important means to solve problems in various fields. Intelligent computing will bring a new solution to the security analysis of lightweight block cipher as its analysis becomes more and more intelligent and automatic.
Huijiao Wang +5 more
wiley +1 more source
Diving Deep into the Weak Keys of Round Reduced Ascon
At ToSC 2021, Rohit et al. presented the first distinguishing and key recovery attacks on 7 rounds Ascon without violating the designer’s security claims of nonce-respecting setting and data limit of 264 blocks per key. So far, these are the best attacks
Raghvendra Rohit, Santanu Sarkar
doaj +1 more source
An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security
The Internet of Things is changing all sectors such as manufacturing, agriculture, city infrastructure, and the automotive industry. All these applications ask for secure processors that can be embedded in the IoT devices. Furthermore, these devices are restricted in terms of computing capabilities, memory, and power consumption.
Wajih El Hadj Youssef +5 more
wiley +1 more source
Low Trace-Count Template Attacks on 32-bit Implementations of ASCON AEAD
The recently adopted Ascon standard by NIST offers a lightweight authenticated encryption algorithm for use in resource-constrained cryptographic devices.
Shih-Chun You +3 more
doaj +1 more source
Comparison of four methods for quantification of biofilms in biphasic cultures [PDF]
Three methods for determining the total biofilm amount in biphasic cultures have been compared: dry weight by filtration after solvent treatment, optical density with a biomass probe and protein content.
Délia, Marie-Line +2 more
core +2 more sources
Consenso colombiano de prevención de enfermedad renal crónica en los niños con bajo peso al nacer
Contexto: el bajo peso al nacer (BPN) es un factor de riesgo para el desarrollo de enfermedad renal crónica (ERC), aumentando su probabilidad de ocurrencia en la vida adulta hasta en 70% y duplicando el riesgo de ERC en edad pediátrica.
Juan Guillermo Cárdenas Aguilera +6 more
doaj +1 more source

