Results 61 to 70 of about 94,502 (210)

TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features: (i) It offers full leakage-resistance, that is, it limits the exploitability of physical ...
Francesco Berti   +4 more
doaj   +1 more source

Smartphone language and resting‐state EEG indicators of self‐focused attention prospectively predict major depressive disorder risk in adolescents

open access: yesJournal of Child Psychology and Psychiatry, EarlyView.
Background Central to major depressive disorder (MDD) onset and maintenance is maladaptive self‐focused attention, which can be reliably indexed by greater: (a) usage of first‐person singular pronouns (e.g., I) in natural language and (b) alpha oscillations in resting‐state EEG.
Lilian Y. Li   +13 more
wiley   +1 more source

Psycho‐social factors associated with disagreement between prospective and retrospective measures of childhood maltreatment

open access: yesJournal of Child Psychology and Psychiatry, EarlyView.
Background Prospective and retrospective measures of childhood maltreatment often identify different individuals and are differentially associated with psychopathology. This study examines psycho‐social factors that may explain discrepancies between these measures.
Oonagh Coleman   +5 more
wiley   +1 more source

DoveMAC: A TBC-based PRF with Smaller State, Full Security, and High Rate

open access: yesIACR Transactions on Symmetric Cryptology, 2019
Recent parallelizable message authentication codes (MACs) have demonstrated the benefit of tweakable block ciphers (TBCs) for authentication with high security guarantees. With ZMAC, Iwata et al.
Tony Grochow, Eik List, Mridul Nandi
doaj   +1 more source

Postprocessing for quantum random number generators: entropy evaluation and randomness extraction

open access: yes, 2013
Quantum random-number generators (QRNGs) can offer a means to generate information-theoretically provable random numbers, in principle. In practice, unfortunately, the quantum randomness is inevitably mixed with classical randomness due to classical ...
B. Chor   +18 more
core   +1 more source

POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers [PDF]

open access: yes, 2020
It is known that attackers can exfiltrate data from air-gapped computers through their speakers via sonic and ultrasonic waves. To eliminate the threat of such acoustic covert channels in sensitive systems, audio hardware can be disabled and the use of ...
Guri, Mordechai
core   +1 more source

Theorizing Family Rituals: A Family Systems Model

open access: yesJournal of Family Theory &Review, EarlyView.
ABSTRACT Family rituals are universal and spontaneous events carried out by families worldwide. The meaning associated with family rituals can greatly benefit individuals and families. A robust body of research, coupled with ongoing theoretical developments, has paved the way for family rituals to become a well‐established construct within family ...
Carla Crespo
wiley   +1 more source

Foundations, Properties, and Security Applications of Puzzles: A Survey

open access: yes, 2020
Cryptographic algorithms have been used not only to create robust ciphertexts but also to generate cryptograms that, contrary to the classic goal of cryptography, are meant to be broken.
Ali, Isra Mohamed   +2 more
core  

Dementia‐Friendly Hospital—The Perspective of Professional Dementia Experts

open access: yesJournal of Clinical Nursing, EarlyView.
ABSTRACT Aim To investigate the professional dementia experts' understanding of a dementia‐friendly hospital to identify its characteristics. Design We used a qualitative design embedded in a case study. A total of 16 semi‐structured expert interviews were conducted with 17 professional dementia experts. Using inductive content analysis, the interviews
Christina Manietta   +7 more
wiley   +1 more source

Redoing Family After Estrangement

open access: yesJournal of Marriage and Family, EarlyView.
ABSTRACT Objective This study theorizes estrangement as a catalyst for redoing family through a dynamic process of rebuilding kinship's meaning, structure, and content. Background Research on family estrangement has overwhelmingly focused on its emotional, social, and financial consequences, overlooking how estrangement holistically reshapes the ...
Rin Reczek
wiley   +1 more source

Home - About - Disclaimer - Privacy