A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers
In this article, we provide the first independent security analysis of Deoxys, a third-round authenticated encryption candidate of the CAESAR competition, and its internal tweakable block ciphers Deoxys-BC-256 and Deoxys-BC-384.
Carlos Cid +4 more
doaj +1 more source
Increasing Youth Safety and Responsible Behavior Online: Putting in Place Programs that Work. [PDF]
Hundreds of programs are being developed to promote safe and responsible online behavior among youth. They are being successfully marketed and eagerly adopted because of their appealing content, exciting graphics, engaging games, catchy phrases and cool ...
Finkelhor, David, Jones, Lisa M.
core +1 more source
3D Textured Model Encryption via 3D Lu Chaotic Mapping
In the coming Virtual/Augmented Reality (VR/AR) era, 3D contents will be popularized just as images and videos today. The security and privacy of these 3D contents should be taken into consideration.
A Bogdanov +9 more
core +1 more source
Latinos mobilizing beyond threats: The role of fear and hope in issue activism
Abstract Interest groups intent on spurring political participation often highlight potential threats to galvanize audiences into action. However, while loss aversion is typically seen as a strong motivator, it is important not to neglect the motivational effect of hope and reward‐seeking behavior as people navigate their political landscape.
Vanessa Cruz Nichols
wiley +1 more source
The Application of Fuzzy Logic Controller to Compute a Trust Level for Mobile Agents in a Smart Home [PDF]
Agents that travel through many hosts may cause a threat on the security of the visited hosts. Assets, system resources, and the reputation of the host are few possible targets for such an attack.
Abu, N.A. +4 more
core +1 more source
Dialogue of the Deaf: How Deliberation With Discontented Citizens May Hopelessly Fail
ABSTRACT Governments employ public deliberation in response to citizen discontent, intending to achieve consensus, mutual understanding, and clarification. However, some studies suggest that deliberation can devolve into a “dialogue of the deaf,” where parties talk past each other, counterproductively leading to conflict, distrust, and confusion ...
Anouk van Twist
wiley +1 more source
Impossible Boomerang Attack for Block Cipher Structures [PDF]
Impossible boomerang attack [5] (IBA) is a new variant of differential cryptanalysis against block ciphers. Evident from its name, it combines the ideas of both impossible differential cryptanalysis and boomerang attack. Though such an attack might not be the best attack available, its complexity is still less than that of the exhaustive search.
Jiali Choy, Huihui Yap
openaire +1 more source
The Polarization of the Cosmic Microwave Background Due to Primordial Gravitational Waves
We review current observational constraints on the polarization of the Cosmic Microwave Background (CMB), with a particular emphasis on detecting the signature of primordial gravitational waves.
ALEXANDER G. POLNAREV +11 more
core +1 more source
Turnover experiences in public accounting and alumni's decisions to “give back”
Abstract This study examines turnover experiences in public accounting, including the exit phase (from public accountants' initial thoughts of leaving to their exit) and the post‐exit phase (from their exit to the present moment) of the turnover process.
Lindsay M. Andiola +2 more
wiley +1 more source
Amplified Boomerang Attack against Reduced-Round SHACAL [PDF]
SHACAL is a 160-bit block cipher based on the hash standard SHA-1, as a submission to NESSIE. SHACAL uses the XOR, modular addition operation and the functions of bit-by-bit manner. These operations and functions make the differential cryptanalysis difficult, i.e, it is hard to find a long differential characteristic with high probability.
Jongsung Kim +5 more
openaire +1 more source

