Results 31 to 40 of about 45,409 (211)

New Genetic Operators for Developing S-Boxes With Low Boomerang Uniformity

open access: yesIEEE Access, 2022
The boomerang uniformity measures the resistance of block ciphers to boomerang attacks and has become an essential criterion of the substitution box (S-box).
Man Kang, Mingsheng Wang
doaj   +1 more source

Images of the Early Universe from the BOOMERanG experiment [PDF]

open access: yes, 2001
The CMB is the fundamental tool to study the properties of the early universe and of the universe at large scales. In the framework of the Hot Big Bang model, when we look to the CMB we look back in time to the end of the plasma era, at a redshift ...
A. BOSCALERI   +38 more
core   +1 more source

The Cosmic Microwave Background & Inflation, Then & Now [PDF]

open access: yes, 2002
Boomerang, Maxima, DASI, CBI and VSA significantly increase the case for accelerated expansion in the early universe (the inflationary paradigm) and at the current epoch (dark energy dominance), especially when combined with data on high redshift ...
Bond, J. R.   +9 more
core   +2 more sources

Measuring CMB Polarization with BOOMERANG

open access: yes, 2003
BOOMERANG is a balloon-borne telescope designed for long duration (LDB) flights around Antarctica. The second LDB Flight of BOOMERANG took place in January 2003. The primary goal of this flight was to measure the polarization of the CMB.
A Balbi   +49 more
core   +1 more source

Cosmological Parameters from Velocities, CMB and Supernovae [PDF]

open access: yes, 2000
We compare and combine likelihood functions of the cosmological parameters Omega_m, h and sigma_8, from peculiar velocities, CMB and type Ia supernovae. These three data sets directly probe the mass in the Universe, without the need to relate the galaxy ...
A. Dekel   +8 more
core   +2 more sources

Improved Search of Boomerang Distinguishers for Generalized Feistel and Application to WARP

open access: yesIACR Transactions on Symmetric Cryptology
Boomerang and rectangle cryptanalysis are powerful cryptanalytic techniques for security evaluation of block ciphers. Automated search for boomerang distinguishers is an important area of research. In FSE 2023, Hadipour et al.
Xinhao Zeng, Lin Tan, Hong Xu
doaj   +1 more source

Acoustic peaks and dips in the CMB power spectrum: observational data and cosmological constraints [PDF]

open access: yes, 2001
The locations and amplitudes of three acoustic peaks and two dips in the last releases of the Boomerang, MAXIMA and DASI measurements of the cosmic microwave background (CMB) anisotropy power spectra as well as their statistical confidence levels are ...
Apunevych S.   +5 more
core   +2 more sources

Boomerang [PDF]

open access: yesACM SIGPLAN Notices, 2008
A lens is a bidirectional program. When read from left toright, it denotes an ordinary function that maps inputs to outputs. When read from right to left, it denotes an ''update translator'' that takes an input together with an updated output and produces a new input that reflects the update.
Bohannon, Aaron   +4 more
openaire   +3 more sources

Direct-to-Consumer Drug Advertisements Can Paradoxically Increase Intentions to Adopt Lifestyle Changes

open access: yesFrontiers in Psychology, 2016
Background: Direct-to-consumer (DTC) prescription drug advertisements are thought to induce boomerang effects, meaning they reduce the perceived effectiveness of the alternative option: non-pharmaceutical treatment via lifestyle change. Past research has
Maya B. Mathur   +4 more
doaj   +1 more source

On Impossible Boomerang Attacks

open access: yesIACR Transactions on Symmetric Cryptology
The impossible boomerang attack, introduced in 2008 by Jiqiang Lu, is an extension of the impossible differential attack that relies on a boomerang distinguisher of probability 0 for discarding incorrect key guesses.
Xavier Bonnetain   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy