Results 51 to 60 of about 10,636 (192)

Boomerang Attack on Step-Reduced SHA-512 [PDF]

open access: yes, 2015
SHA-2 (SHA-224, SHA-256, SHA-384 and SHA-512) is hash function family issued by the National Institute of Standards and Technology (NIST) in 2002 and is widely used all over the world. In this work, we analyze the security of SHA-512 with respect to boomerang attack.
Hongbo Yu, Dongxia Bai
openaire   +1 more source

Turnover experiences in public accounting and alumni's decisions to “give back”

open access: yesContemporary Accounting Research, EarlyView.
Abstract This study examines turnover experiences in public accounting, including the exit phase (from public accountants' initial thoughts of leaving to their exit) and the post‐exit phase (from their exit to the present moment) of the turnover process.
Lindsay M. Andiola   +2 more
wiley   +1 more source

A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In this article, we provide the first independent security analysis of Deoxys, a third-round authenticated encryption candidate of the CAESAR competition, and its internal tweakable block ciphers Deoxys-BC-256 and Deoxys-BC-384.
Carlos Cid   +4 more
doaj   +1 more source

Increasing Youth Safety and Responsible Behavior Online: Putting in Place Programs that Work. [PDF]

open access: yes, 2011
Hundreds of programs are being developed to promote safe and responsible online behavior among youth. They are being successfully marketed and eagerly adopted because of their appealing content, exciting graphics, engaging games, catchy phrases and cool ...
Finkelhor, David, Jones, Lisa M.
core   +1 more source

The Long‐Term Effects of Populism on Foreign Policy: Berlusconi's Legacy and Its Impact on Italy's Approach to the EU and International Politics

open access: yesJCMS: Journal of Common Market Studies, EarlyView.
Abstract What are the long‐term effects of populism on foreign policy? This aspect has not been addressed yet by the burgeoning literature on the international consequences of populism. In this contribution, we hypothesise that the two distinctive features of populist foreign policy‐making, mobilisation/politicisation and personalisation/centralisation,
Sandra Destradi, Emidio Diodato
wiley   +1 more source

Dialogue of the Deaf: How Deliberation With Discontented Citizens May Hopelessly Fail

open access: yesPublic Administration, EarlyView.
ABSTRACT Governments employ public deliberation in response to citizen discontent, intending to achieve consensus, mutual understanding, and clarification. However, some studies suggest that deliberation can devolve into a “dialogue of the deaf,” where parties talk past each other, counterproductively leading to conflict, distrust, and confusion ...
Anouk van Twist
wiley   +1 more source

The Polarization of the Cosmic Microwave Background Due to Primordial Gravitational Waves

open access: yes, 2006
We review current observational constraints on the polarization of the Cosmic Microwave Background (CMB), with a particular emphasis on detecting the signature of primordial gravitational waves.
ALEXANDER G. POLNAREV   +11 more
core   +1 more source

Impossible Boomerang Attack for Block Cipher Structures [PDF]

open access: yes, 2009
Impossible boomerang attack [5] (IBA) is a new variant of differential cryptanalysis against block ciphers. Evident from its name, it combines the ideas of both impossible differential cryptanalysis and boomerang attack. Though such an attack might not be the best attack available, its complexity is still less than that of the exhaustive search.
Jiali Choy, Huihui Yap
openaire   +1 more source

Homological Correspondence: Israel as a Frontier of Global Domination

open access: yesAntipode, Volume 58, Issue 2, March 2026.
ABSTRACT This article offers a novel framing for enquiring the deep entanglement between Israel and Western‐led global centers of domination. Moving beyond geopolitical reasonings and historical analogies, it locates this relationship within a dynamic space of homological correspondence, positioning Israel as its frontier.
Wassim Ghantous
wiley   +1 more source

The Predominant Role of Musical Valence Over Arousal in Pain Modulation: A Psychophysiological Study

open access: yesInternational Journal of Psychology, Volume 61, Issue 1, February 2026.
ABSTRACT Several studies have demonstrated the potential capacity of music to induce emotions and manage pain. However, the psychophysiological mechanisms underlying the effects of emotional dimensions (valence and arousal) induced by music on the modulation of pain perception remain poorly understood.
Veronika Diaz Abrahan   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy