Results 11 to 20 of about 687 (113)

De héroes y encrucijadas: el bivium, motivo ideológico y estructurador de las narraciones caballerescas espirituales del Siglo de Oro

open access: yes, 1970
Se analiza, a partir de la tradición literaria e iconográfica anterior, uno de los motivos más recurrentes de las narraciones caballerescas espirituales del Siglo de Oro: el del bivium o camino que se bifurca, que sirve de hilo conductor de la aventura llevando al protagonista, cual Hércules prodicus, tras la siempre difícil elección, por el camino ...
Emma Herrán Alonso
openaire   +4 more sources

Using SAT Solvers to Finding Short Cycles in Cryptographic Algorithms [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2020
A desirable property of iterated cryptographic algorithms, such as stream ciphers or pseudo-random generators, is the lack of short cycles. Many of the previously mentioned algorithms are based on the use of linear feedback shift registers (LFSR) and ...
Władysław Dudzic, Krzysztof Kanciak
doaj   +1 more source

Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things

open access: yesIEEE Access, 2020
With technical development and internet popularization, Internet of Things (IoT) technology is gaining a wider application in various fields. Key challenges in the growth of IoT are related to privacy and security. To avoid any possible malicious attacks,
Yu He, Gaoli Wang, Wenshan Li, Yizhi Ren
doaj   +1 more source

Stream/block ciphers, difference equations and algebraic attacks [PDF]

open access: yesJournal of symbolic computation, 2020
In this paper we introduce a general class of stream and block ciphers that are defined by means of systems of (ordinary) explicit difference equations over a finite field. We call this class "difference ciphers".
R. L. Scala, S. Tiwari
semanticscholar   +1 more source

Algebraic Side Channel Attack on Trivium and Grain Ciphers

open access: yesIEEE Access, 2017
Solving a system of multivariate quadratic equations obtained through algebraic cryptanalysis is a nondeterministic polynomial time-complete problem. Owing to the trend of stream ciphers based on nonlinear update, the success of algebraic attacks has ...
Asif Raza Kazmi   +4 more
doaj   +1 more source

Numerical solvers and cryptanalysis

open access: yesJournal of Mathematical Cryptology, 2009
In this paper, we present an approach to apply numerical methods in the cryptanalysis of modern cryptographic algorithms. We focus on the stream cipher Trivium. It is a stream cipher recommended by the eStream project in the hardware category.
Lamberger Mario   +2 more
doaj   +1 more source

Abundance and Diversity of Holothuroids in Shallow Habitats of the Northern Red Sea

open access: yesJournal of Marine Sciences, Volume 2014, Issue 1, 2014., 2014
Holothuroid sea cucumbers are vital members of Coral Reefs and associated marine habitats and provide vital ecological services. In the southern regions of the Red Sea their populations have been decimated by overfishing. The main objective of this study was to test the hypothesis that the northern part of the Red Sea serves as an ecological refuge for
Boaz Yuval   +3 more
wiley   +1 more source

Modeling, Optimization, and Verification for Complex Systems

open access: yes, 2016
Mathematical Problems in Engineering, Volume 2016, Issue 1, 2016.
Guiming Luo   +5 more
wiley   +1 more source

Growth, Injury, and Population Dynamics in the Extant Cyrtocrinid Holopus mikihe (Crinoidea, Echinodermata) near Roatan, Honduras [PDF]

open access: yes, 2014
The crinoid order Cyrtocrinida is known mainly from Mesozoic fossils; its few surviving members, all from bathyal environments, are among the most peculiar living crinoids.
Baumiller, Tomasz K.   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy