Results 101 to 110 of about 45,409 (211)
Resumen: La presente investigación indaga en la influencia de algunos escritores latinoamericanos entre los intelectuales españoles a lo largo del siglo XX.
Carmen Alemany Bay
doaj +1 more source
Automatic boomerang attacks search on Rijndael
Boomerang attacks were introduced in 1999 by Wagner (The boomerang attack. In: Knudsen LR, editor. FSE’99. vol. 1636 of LNCS. Heidelberg: Springer; 1999. p.
Rouquette Loïc +2 more
doaj +1 more source
Background Degeneration of the intervertebral disc is a significant source of chronic axial low back pain. Direct supplementation of degenerated nucleus pulposis (NP) tissue with intradiscally delivered allogeneic NP represents an opportunity to bridge ...
Douglas P. Beall +9 more
doaj +1 more source
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect
In the CAESAR competition, Deoxys-I and Deoxys-II are two important authenticated encryption schemes submitted by Jean et al. Recently, Deoxys-II together with Ascon, ACORN, AEGIS-128, OCB and COLM have been selected as the final CAESAR portfolio ...
Boxin Zhao, Xiaoyang Dong, Keting Jia
doaj +1 more source
The Cosmic Microwave Background and Inflation Parameters
We review the currrent cosmic parameter determinations of relevance to inflation using the WMAP-1year, Boomerang, CBI, Acbar and other CMB data.
Bond, J. R. +3 more
core +1 more source
Related-key impossible boomerang cryptanalysis on LBlock
The related-key impossible boomerang cryptanalysis and the strength of the lightweight block cipher LBlock against this method were investigated.A new attack on 22-round LBlock was presented combining impossible boomerang attacks with related-key attacks.
Min XIE, Yan-li MU
doaj +2 more sources
Information Gains from Cosmic Microwave Background Experiments
To shed light on the fundamental problems posed by Dark Energy and Dark Matter, a large number of experiments have been performed and combined to constrain cosmological models.
Akeret, Joël +4 more
core +1 more source
Impossible Boomerang Attacks Revisited
The impossible boomerang (IB) attack was first introduced by Lu in his doctoral thesis and subsequently published at DCC in 2011. The IB attack is a variant of the impossible differential (ID) attack by incorporating the idea of the boomerang attack. In
Jianing Zhang, Haoyang Wang, Deng Tang
doaj +1 more source
Intergenerational coresidence and parental depression: A discrete-time survival analysis of the 'boomerang kids' phenomenon. [PDF]
Choi S, Choi E, Jang SY.
europepmc +1 more source

