Results 51 to 60 of about 10,387 (191)
NEW KEY EXPANSION FUNCTION OF RIJNDAEL 128-BIT RESISTANCE TO THE RELATED-KEY ATTACKS
A master key of special length is manipulated based on the key schedule to create round sub-keys in most block ciphers. A strong key schedule is described as a cipher that will be more resistant to various forms of attacks, especially in related-key ...
Hassan Mansur Hussien +2 more
doaj +1 more source
Boomerang Attack on Step-Reduced SHA-512 [PDF]
SHA-2 (SHA-224, SHA-256, SHA-384 and SHA-512) is hash function family issued by the National Institute of Standards and Technology (NIST) in 2002 and is widely used all over the world. In this work, we analyze the security of SHA-512 with respect to boomerang attack.
Dongxia Bai, Hongbo Yu
openaire +2 more sources
A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers
In this article, we provide the first independent security analysis of Deoxys, a third-round authenticated encryption candidate of the CAESAR competition, and its internal tweakable block ciphers Deoxys-BC-256 and Deoxys-BC-384.
Carlos Cid +4 more
doaj +1 more source
Abstract What are the long‐term effects of populism on foreign policy? This aspect has not been addressed yet by the burgeoning literature on the international consequences of populism. In this contribution, we hypothesise that the two distinctive features of populist foreign policy‐making, mobilisation/politicisation and personalisation/centralisation,
Sandra Destradi, Emidio Diodato
wiley +1 more source
Dialogue of the Deaf: How Deliberation With Discontented Citizens May Hopelessly Fail
ABSTRACT Governments employ public deliberation in response to citizen discontent, intending to achieve consensus, mutual understanding, and clarification. However, some studies suggest that deliberation can devolve into a “dialogue of the deaf,” where parties talk past each other, counterproductively leading to conflict, distrust, and confusion ...
Anouk van Twist
wiley +1 more source
Increasing Youth Safety and Responsible Behavior Online: Putting in Place Programs that Work. [PDF]
Hundreds of programs are being developed to promote safe and responsible online behavior among youth. They are being successfully marketed and eagerly adopted because of their appealing content, exciting graphics, engaging games, catchy phrases and cool ...
Finkelhor, David, Jones, Lisa M.
core +1 more source
Fundamentals and Perspectives on Materials for Bifunctional Electrocatalysis
This review presents a comparative evaluation of key catalyst families for HER and OER, including MOFs, metal oxides, hydroxides/hydrides, carbon‐based materials, phosphides, and chalcogenides. Their electrochemical activity, stability, and commercialization potential are critically analyzed, with design strategies for hybrid catalysts also discussed ...
Iqra Fareed +8 more
wiley +1 more source
3D Textured Model Encryption via 3D Lu Chaotic Mapping
In the coming Virtual/Augmented Reality (VR/AR) era, 3D contents will be popularized just as images and videos today. The security and privacy of these 3D contents should be taken into consideration.
A Bogdanov +9 more
core +1 more source
The Polarization of the Cosmic Microwave Background Due to Primordial Gravitational Waves
We review current observational constraints on the polarization of the Cosmic Microwave Background (CMB), with a particular emphasis on detecting the signature of primordial gravitational waves.
ALEXANDER G. POLNAREV +11 more
core +1 more source
Decolonial and antiracist teacher education practice: Challenges and alternatives
Abstract Decolonial and antiracist perspectives offer critical and humanizing approaches to supporting justice‐affirming language teacher education. In this commentary, we provide a conceptual grounding for decolonial and antiracist pedagogies as constitutive of justice‐affirming language education.
Ryuko Kubota, Suhanthie Motha
wiley +1 more source

