Results 101 to 110 of about 45,409 (211)

Escritores latinoamericanos en la España del siglo XX / Latin American Writers in the XXth Century Spain

open access: yesKamchatka: Revista de Análisis Cultural, 2017
Resumen: La presente investigación indaga en la influencia de algunos escritores latinoamericanos entre los intelectuales españoles a lo largo del siglo XX.
Carmen Alemany Bay
doaj   +1 more source

Automatic boomerang attacks search on Rijndael

open access: yesJournal of Mathematical Cryptology
Boomerang attacks were introduced in 1999 by Wagner (The boomerang attack. In: Knudsen LR, editor. FSE’99. vol. 1636 of LNCS. Heidelberg: Springer; 1999. p.
Rouquette Loïc   +2 more
doaj   +1 more source

Supplemental nucleus pulposus allograft in patients with lumbar discogenic pain: results of a prospective feasibility study

open access: yesBMC Musculoskeletal Disorders
Background Degeneration of the intervertebral disc is a significant source of chronic axial low back pain. Direct supplementation of degenerated nucleus pulposis (NP) tissue with intradiscally delivered allogeneic NP represents an opportunity to bridge ...
Douglas P. Beall   +9 more
doaj   +1 more source

New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect

open access: yesIACR Transactions on Symmetric Cryptology, 2019
In the CAESAR competition, Deoxys-I and Deoxys-II are two important authenticated encryption schemes submitted by Jean et al. Recently, Deoxys-II together with Ascon, ACORN, AEGIS-128, OCB and COLM have been selected as the final CAESAR portfolio ...
Boxin Zhao, Xiaoyang Dong, Keting Jia
doaj   +1 more source

The Cosmic Microwave Background and Inflation Parameters

open access: yes, 2004
We review the currrent cosmic parameter determinations of relevance to inflation using the WMAP-1year, Boomerang, CBI, Acbar and other CMB data.
Bond, J. R.   +3 more
core   +1 more source

Related-key impossible boomerang cryptanalysis on LBlock

open access: yesTongxin xuebao, 2017
The related-key impossible boomerang cryptanalysis and the strength of the lightweight block cipher LBlock against this method were investigated.A new attack on 22-round LBlock was presented combining impossible boomerang attacks with related-key attacks.
Min XIE, Yan-li MU
doaj   +2 more sources

Information Gains from Cosmic Microwave Background Experiments

open access: yes, 2014
To shed light on the fundamental problems posed by Dark Energy and Dark Matter, a large number of experiments have been performed and combined to constrain cosmological models.
Akeret, Joël   +4 more
core   +1 more source

Impossible Boomerang Attacks Revisited

open access: yesIACR Transactions on Symmetric Cryptology
The impossible boomerang (IB) attack was first introduced by Lu in his doctoral thesis and subsequently published at DCC in 2011. The IB attack is a variant of the impossible differential (ID) attack by incorporating the idea of the boomerang attack. In
Jianing Zhang, Haoyang Wang, Deng Tang
doaj   +1 more source

Boomerangs [PDF]

open access: yesScientific American, 1903
openaire   +1 more source

Home - About - Disclaimer - Privacy