Results 1 to 10 of about 45,409 (211)
The generative mechanism of workplace boomerang behavior: a grounded theory approach [PDF]
BackgroundAs employee turnover intensifies and the talent shortage grows, boomerang employment—the phenomenon of former employees returning to their previous organizations—has become increasingly common.
Zehui Tian +3 more
doaj +2 more sources
Boomerang Returns Unexpectedly [PDF]
11 pages, 3 figures, final version accepted by ...
White, Martin +2 more
openaire +5 more sources
Quantum boomerang effect of light [PDF]
The quantum boomerang effect is a counterintuitive phenomenon in which a wave packet launched with finite momentum in a disordered medium returns to its origin.
Xiangrui Hou +5 more
doaj +2 more sources
Boomerang Sign in the Splenium of the Corpus Callosum After Vestibullar Schwannoma Treatment: Case Report and Review of the Literature [PDF]
Background and Clinical Significance: The term “boomerang sign” refers to a boomerang-shaped area of cytotoxic edema in the splenium of the corpus callosum. It is seen as hyperintense lesions on T2-weighted images, FLAIR and DWI in MRI.
Maciej Laskowski +5 more
doaj +2 more sources
The Generative Mechanism of Boomerang Intention: From the Perspective of Legacy Identification
Boomerang employment has become an increasingly significant third way to obtain employees, yet little research has focused on why does ex-employee want to come back.
Zehui Tian +3 more
doaj +1 more source
New Properties of the Double Boomerang Connectivity Table
The double boomerang connectivity table (DBCT) is a new table proposed recently to capture the behavior of two consecutive S-boxes in boomerang attacks.
Qianqian Yang +4 more
doaj +1 more source
On Boomerang Attacks on Quadratic Feistel Ciphers
The recent introduction of the Boomerang Connectivity Table (BCT) at Eurocrypt 2018 revived interest in boomerang cryptanalysis and in the need to correctly build boomerang distinguishers.
Xavier Bonnetain, Virginie Lallemand
doaj +1 more source
Throwing Boomerangs into Feistel Structures
Automatic tools to search for boomerang distinguishers have seen significant advances over the past few years. However, most previous work has focused on ciphers based on a Substitution Permutation Network (SPN), while analyzing the Feistel structure is
Hosein Hadipour +2 more
doaj +1 more source
SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers
In Addition-Rotation-Xor (ARX) ciphers, the large domain size obstructs the application of the boomerang connectivity table. In this paper, we explore the problem of computing this table for a modular addition and the automatic search of boomerang ...
Dachao Wang, Baocang Wang, Siwei Sun
doaj +1 more source
Improved Rectangle Attacks on SKINNY and CRAFT
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard the target cipher E as a composition of two sub-ciphers, i.e., E = E1 ∘ E0, to construct a distinguisher for E with probability p2q2 by concatenating two short ...
Hosein Hadipour +2 more
doaj +1 more source

