Results 51 to 60 of about 93,608 (187)
The new poor law and the health of the population of England and Wales
Abstract We estimate the impact of reductions in poor law expenditure on rural life expectancy and mortality rates in England and Wales following the 1834 Poor Law Amendment Act. Given the scale of cuts imposed, our estimates imply 8–10 per cent increases in mortality at ages 1–4 years and 2–4 per cent falls in rural expectation of life at birth.
David Green +3 more
wiley +1 more source
216 Jewish Hospital of St. Louis [PDF]
https://digitalcommons.wustl.edu/bjc_216/1078/thumbnail ...
core +1 more source
Background Central to major depressive disorder (MDD) onset and maintenance is maladaptive self‐focused attention, which can be reliably indexed by greater: (a) usage of first‐person singular pronouns (e.g., I) in natural language and (b) alpha oscillations in resting‐state EEG.
Lilian Y. Li +13 more
wiley +1 more source
The Flemish connection: socio-cultural news from London in the Ghendtsche post-tydingen (1667-1723) [PDF]
The two case studies in this essay call attention to the Ghent newspaper Ghendtsche Post-tydingen (1667-1723) as a neglected source of information, not only on English theatrical matters but also-and primarily-on the political significance of such news ...
Uytterschout, Sien +1 more
core +2 more sources
Background Prospective and retrospective measures of childhood maltreatment often identify different individuals and are differentially associated with psychopathology. This study examines psycho‐social factors that may explain discrepancies between these measures.
Oonagh Coleman +5 more
wiley +1 more source
Permutation-Based Hashing Beyond the Birthday Bound
It is known that the sponge construction is tightly indifferentiable from a random oracle up to around 2c/2 queries, where c is the capacity. In particular, it cannot provide generic security better than half of the underlying permutation size.
Charlotte Lefevre, Bart Mennink
doaj +1 more source
Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier
A hash function secure in the indifferentiability framework (TCC 2004) is able to resist all meaningful generic attacks. Such hash functions also play a crucial role in establishing the security of protocols that use them as random functions.
Moody Dustin +2 more
doaj +1 more source
TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features: (i) It offers full leakage-resistance, that is, it limits the exploitability of physical ...
Francesco Berti +4 more
doaj +1 more source
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security [PDF]
In this paper, we define and analyze a new blockcipher mode of operation for encryption, CENC, which stands for Cipher-based ENCryption. CENC has the following advantages: (1) beyond the birthday bound security, (2) security proofs with the standard PRP assumption, (3) highly efficient, (4) single blockcipher key, (5) fully parallelizable, (6) allows ...
openaire +1 more source
Foundations, Properties, and Security Applications of Puzzles: A Survey
Cryptographic algorithms have been used not only to create robust ciphertexts but also to generate cryptograms that, contrary to the classic goal of cryptography, are meant to be broken.
Ali, Isra Mohamed +2 more
core

