Results 41 to 50 of about 10,636 (192)

Post-Apocalyptic Geographies and Structural Appropriation [PDF]

open access: yes, 2018
Excerpt from Routledge Companion to Transnational American Studies, edited by Nina Morgan, Alfred Hornung, and Takayuki ...
Hsu, Hsuan L., Yazell, Bryan
core   +1 more source

CryptoMaze: Atomic Off-Chain Payments in Payment Channel Network [PDF]

open access: yes, 2020
Payment protocols developed to realize off-chain transactions in Payment channel network (PCN) assumes the underlying routing algorithm transfers the payment via a single path. However, a path may not have sufficient capacity to route a transaction.
Mazumdar, Subhra, Ruj, Sushmita
core   +2 more sources

Education & countering violent extremism: western logics from South to North [PDF]

open access: yes, 2017
This paper explores the way education and conflict have become entangled during the post-9/11 ‘war on terror’ response to ‘radical Islam’ at home and abroad. The paper charts the complex ways that education has been deployed to serve Western military and
Novelli, Mario
core   +1 more source

Related-key impossible boomerang cryptanalysis on LBlock

open access: yesTongxin xuebao, 2017
The related-key impossible boomerang cryptanalysis and the strength of the lightweight block cipher LBlock against this method were investigated.A new attack on 22-round LBlock was presented combining impossible boomerang attacks with related-key attacks.
Min XIE, Yan-li MU
doaj   +2 more sources

Boomerang Connectivity Table Revisited. Application to SKINNY and AES

open access: yesIACR Transactions on Symmetric Cryptology, 2019
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as the composition of two sub-ciphers, i.e., E = E1 o E0, and which constructs distinguishers for E with probability p2q2 by combining differential trails for ...
Ling Song, Xianrui Qin, Lei Hu
doaj   +1 more source

Artivistic interventions as humorous re-appropriations

open access: yesThe European Journal of Humour Research, 2015
The article reflects on the synergic interaction of artistic creativity and activist engagement through a humorous approach of some contemporary civilian protest actions in Slovenia.
Aldo Milohnic
doaj   +3 more sources

Improved Search of Boomerang Distinguishers for Generalized Feistel and Application to WARP

open access: yesIACR Transactions on Symmetric Cryptology
Boomerang and rectangle cryptanalysis are powerful cryptanalytic techniques for security evaluation of block ciphers. Automated search for boomerang distinguishers is an important area of research. In FSE 2023, Hadipour et al.
Xinhao Zeng, Lin Tan, Hong Xu
doaj   +1 more source

Polytopic Cryptanalysis [PDF]

open access: yes, 2016
Standard differential cryptanalysis uses statistical dependencies between the difference of two plaintexts and the difference of the respective two ciphertexts to attack a cipher.
A Biryukov   +25 more
core   +3 more sources

NEW KEY EXPANSION FUNCTION OF RIJNDAEL 128-BIT RESISTANCE TO THE RELATED-KEY ATTACKS

open access: yesJournal of ICT, 2018
A master key of special length is manipulated based on the key schedule to create round sub-keys in most block ciphers. A strong key schedule is described as a cipher that will be more resistant to various forms of attacks, especially in related-key ...
Hassan Mansur Hussien   +2 more
doaj   +1 more source

3D Textured Model Encryption via 3D Lu Chaotic Mapping

open access: yes, 2017
In the coming Virtual/Augmented Reality (VR/AR) era, 3D contents will be popularized just as images and videos today. The security and privacy of these 3D contents should be taken into consideration.
A Bogdanov   +9 more
core   +1 more source

Home - About - Disclaimer - Privacy