NEW KEY EXPANSION FUNCTION OF RIJNDAEL 128-BIT RESISTANCE TO THE RELATED-KEY ATTACKS
A master key of special length is manipulated based on the key schedule to create round sub-keys in most block ciphers. A strong key schedule is described as a cipher that will be more resistant to various forms of attacks, especially in related-key ...
Hassan Mansur Hussien +2 more
doaj +1 more source
Boomerang Attack on Step-Reduced SHA-512 [PDF]
SHA-2 (SHA-224, SHA-256, SHA-384 and SHA-512) is hash function family issued by the National Institute of Standards and Technology (NIST) in 2002 and is widely used all over the world. In this work, we analyze the security of SHA-512 with respect to boomerang attack.
Hongbo Yu, Dongxia Bai
openaire +1 more source
ABSTRACT Deforestation and its social impacts are an enduring challenge in agrarian frontiers, especially in the tropics. Fueled by global demand for commodities, this process is mediated by ideas, concepts, meanings, and policies that uphold socioenvironmental degradation. A key and understudied—arena in which this mediation occurs is the sub‐national
Gabriela Russo Lopes, Fabio de Castro
wiley +1 more source
A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers
In this article, we provide the first independent security analysis of Deoxys, a third-round authenticated encryption candidate of the CAESAR competition, and its internal tweakable block ciphers Deoxys-BC-256 and Deoxys-BC-384.
Carlos Cid +4 more
doaj +1 more source
The “Magic” of Conflict: How Participatory Governance Can Enable Transformative Climate Adaptation
ABSTRACT In many cases, addressing climate risks requires transformative climate adaptation (TCA) that goes beyond small adjustments to existing systems. While scholars increasingly argue that participatory governance is key and should embrace conflict rather than push for consensus to enable TCA, this assumption remains underexplored.
Dore Engbersen +2 more
wiley +1 more source
The Application of Fuzzy Logic Controller to Compute a Trust Level for Mobile Agents in a Smart Home [PDF]
Agents that travel through many hosts may cause a threat on the security of the visited hosts. Assets, system resources, and the reputation of the host are few possible targets for such an attack.
Abu, N.A. +4 more
core +1 more source
Education & countering violent extremism: western logics from South to North [PDF]
This paper explores the way education and conflict have become entangled during the post-9/11 ‘war on terror’ response to ‘radical Islam’ at home and abroad. The paper charts the complex ways that education has been deployed to serve Western military and
Novelli, Mario
core +1 more source
Latinos mobilizing beyond threats: The role of fear and hope in issue activism
Abstract Interest groups intent on spurring political participation often highlight potential threats to galvanize audiences into action. However, while loss aversion is typically seen as a strong motivator, it is important not to neglect the motivational effect of hope and reward‐seeking behavior as people navigate their political landscape.
Vanessa Cruz Nichols
wiley +1 more source
The Polarization of the Cosmic Microwave Background Due to Primordial Gravitational Waves
We review current observational constraints on the polarization of the Cosmic Microwave Background (CMB), with a particular emphasis on detecting the signature of primordial gravitational waves.
ALEXANDER G. POLNAREV +11 more
core +1 more source
Level discrimination of speech sounds by hearing-impaired individuals with and without hearing amplification [PDF]
Objectives: The current study was designed to see how hearing-impaired individuals judge level differences between speech sounds with and without hearing amplification.
Akeroyd, Michael A., Whitmer, William M.
core +1 more source

