Results 61 to 70 of about 51,661 (237)

New Results About the Boomerang Uniformity of Permutation Polynomials [PDF]

open access: yesIEEE Transactions on Information Theory, 2019
In EUROCRYPT 2018, Cid et al. introduced a new concept on the cryptographic property of S-boxes: boomerang connectivity table (BCT for short) for evaluating the subtleties of boomerang-style attacks.
Kangquan Li   +3 more
semanticscholar   +1 more source

Deciphering colour building blocks of massive multiparton amplitudes at 4-loops and beyond

open access: yesJournal of High Energy Physics, 2023
The soft function in non-abelian gauge theories exponentiate, and their logarithms can be organised in terms of the collections of Feynman diagrams called Cwebs.
Neelima Agarwal   +3 more
doaj   +1 more source

Foregrounds in the BOOMERANG-LDB data: a preliminary rms analysis [PDF]

open access: yes, 2000
We present a preliminary analysis of the BOOMERanG LDB maps, focused on foregrounds. BOOMERanG detects dust emission at moderately low galactic latitudes ($b > -20^o$) in bands centered at 90, 150, 240, 410 GHz.
Ade, P. A. R.   +20 more
core   +1 more source

Fibrates Inhibit PLTP‐induced M2 Macrophage Infiltration and Increase the Sensitivity of Hepatocellular Carcinoma to ICIs

open access: yesAdvanced Science, EarlyView.
Phospholipid transfer protein(PLTP) plays a critical role in forming a complex with kinase A (AURKA) and P65. This interaction facilitates phosphorylation of P65 at Ser536, leading to the activation of the NF‐κB signaling pathway. Ultimately, this leads to the upregulation of downstream cytokines, including IL‐6, IL‐8, and CSF‐1, which promotes M2 ...
Xinyue Liang   +14 more
wiley   +1 more source

Hunting for New Physics with Unitarity Boomerangs [PDF]

open access: yes, 2010
Although the unitarity triangles ($UTs$) carry information about the Kobayashi-Maskawa (KM) quark mixing matrix, it explicitly contains just three parameters which is one short to completely fix the KM matrix.
Frampton, Paul H., He, Xiao-Gang
core   +3 more sources

Ontogeny of the malleus in Mesocricetus auratus (Mammalia, Rodentia): Systematic and functional implications for the muroid middle ear

open access: yesThe Anatomical Record, EarlyView.
Abstract The three mammalian auditory ossicles enhance sound transmission from the tympanic membrane to the inner ear. The anterior anchoring of the malleus is one of the key characters for functional classification of the auditory ossicles. Previous studies revealed a medial outgrowth of the mallear anterior process, the processus internus ...
Franziska Fritzsche   +2 more
wiley   +1 more source

Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARP

open access: yesIACR Transactions on Symmetric Cryptology, 2022
In this paper we present a boomerang analysis of WARP, a recently proposed Generalized Feistel Network with extremely compact hardware implementations.
Virginie Lallemand   +2 more
doaj   +1 more source

Constraining neutrino physics with BBN and CMBR [PDF]

open access: yes, 2001
We perform a likelihood analysis of the recent results on the anisotropy of Cosmic Microwave Background Radiation from the BOOMERanG and DASI experiments to show that they single out an effective number of neutrinos in good agreement with standard Big ...
Hansen, S. H.   +4 more
core   +2 more sources

Under the Shade of a Coolabah Tree: A Second Cache of Tulas From the Boulia District, Western Queensland

open access: yesArchaeology in Oceania, EarlyView.
ABSTRACT This paper reports on the excavation of a cache of stone artefacts, buried on the bank of a waterhole or ‘billabong’ in central western Queensland. This is an extremely rare find, and yet it is the second such site to be reported within less than a 10 km radius.
Yinika L. Perston   +5 more
wiley   +1 more source

Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys

open access: yesIACR Transactions on Symmetric Cryptology, 2019
The boomerang attack is a cryptanalysis technique that allows an attacker to concatenate two short differential characteristics. Several research results (ladder switch, S-box switch, sandwich attack, Boomerang Connectivity Table (BCT), ...) showed that ...
Haoyang Wang, Thomas Peyrin
doaj   +1 more source

Home - About - Disclaimer - Privacy