Results 41 to 50 of about 94,502 (210)
Stream ciphers are vulnerable to generic time-memory-data tradeoff attacks. These attacks reduce the security level to half of the cipher’s internal state size.
Matthias Hamann +3 more
doaj +1 more source
New Constructions of MACs from (Tweakable) Block Ciphers
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional block ciphers. Our new schemes are either stateless and deterministic, nonce-based, or randomized, and provably secure either in the standard model for ...
Benoît Cogliati +2 more
doaj +1 more source
The costs of Suaahara II, a complex scaled-up multisectoral nutrition programme in Nepal. [PDF]
Suaahara II, a scaled up multisectoral nutrition programme in Nepal, cost US$132 per programme participant (mother in the 1000‐day period). Opportunity costs of volunteer and participant time are high, accounting for 47% of total costs. Complex multisectoral programmes require significant resources to ensure coordination and support at national and ...
Choo EM +8 more
europepmc +2 more sources
Multi-User BBB Security of Public Permutations Based MAC [PDF]
At CRYPTO 2019, Chen et al. have shown a beyond the birthday bound secure $n$-bit to $n$-bit PRF based on public random permutations. Followed by the work, Dutta and Nandi have proposed a beyond the birthday bound secure nonce based MAC $\textsf{nEHtM}_p$
Avijit Dutta, Mridul Nandi, Yu Long Chen
core
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF
SUM-ECBC (Yasuda, CT-RSA 2010) is the first beyond birthday bound (BBB) secure block cipher based deterministic MAC. After this work, some more BBB secure deterministic MACs have been proposed, namely PMAC_Plus (Yasuda, CRYPTO 2011), 3kf9 (Zhang et al ...
Nilanjan Datta +3 more
doaj +1 more source
ABSTRACT A Summer Research Program (SRP) at a large public university in the southern United States prepares undergraduate STEM majors to engage with high school students from underrepresented backgrounds. Grounded in culturally responsive pedagogy (CRP) and layered mentorship, SRP fosters inclusive teaching practices and professional growth among ...
Mariam A. Manuel +4 more
wiley +1 more source
ABSTRACT Background Adolescence is a period when families must balance emotional connection with growing autonomy. How family functioning supports well‐being during this transition remains unclear, particularly in cultural contexts that value harmony amid difference.
Tiange Sui, Jerf W. K. Yeung
wiley +1 more source
Cymric: Short-tailed but Mighty
Authenticated encryption (AE) is a fundamental tool in today’s secure communication. Numerous designs have been proposed, including well-known standards such as GCM.
Alexandre Adomnicăi +4 more
doaj +1 more source
Abstract Tree‐planting initiatives are a crucial part of international sustainability and climate action efforts. Yet, many of these initiatives fail to achieve their long‐term sustainability and climate goals. The role of community value is an often‐overlooked factor in promoting the success of new tree plantings.
Claire L. Narraway +8 more
wiley +1 more source
This article argues that the current way of thinking about ethics in sport in primarily biomedical terms, and in particular in terms of the presence of particular pharmaceutical substances, fails to account for broader notions of sporting ethics and fairness in the Global South.
Michael Crawley, Uroš Kovač
wiley +1 more source

