Results 51 to 60 of about 10,650 (191)
Impossible Boomerang Attack for Block Cipher Structures [PDF]
Impossible boomerang attack [5] (IBA) is a new variant of differential cryptanalysis against block ciphers. Evident from its name, it combines the ideas of both impossible differential cryptanalysis and boomerang attack. Though such an attack might not be the best attack available, its complexity is still less than that of the exhaustive search.
Jiali Choy, Huihui Yap
openaire +1 more source
Dialogue of the Deaf: How Deliberation With Discontented Citizens May Hopelessly Fail
ABSTRACT Governments employ public deliberation in response to citizen discontent, intending to achieve consensus, mutual understanding, and clarification. However, some studies suggest that deliberation can devolve into a “dialogue of the deaf,” where parties talk past each other, counterproductively leading to conflict, distrust, and confusion ...
Anouk van Twist
wiley +1 more source
Priming Past the Primary: Mass Media, Issue Salience and Candidate Evaluation in a Race Governor [PDF]
Past research indicates that voters have begun to rely less on party affiliations and more on candidates\u27 images and positions on issues in making voting decisions.
Griffin, Robert J., Ph.D. +1 more
core +1 more source
Amplified Boomerang Attack against Reduced-Round SHACAL [PDF]
SHACAL is a 160-bit block cipher based on the hash standard SHA-1, as a submission to NESSIE. SHACAL uses the XOR, modular addition operation and the functions of bit-by-bit manner. These operations and functions make the differential cryptanalysis difficult, i.e, it is hard to find a long differential characteristic with high probability.
Jongsung Kim +5 more
openaire +1 more source
ABSTRACT This paper deploys a Gramscian theorisation of the conjuncture to argue that the contemporary global political economy is becoming constituted through the destruction of Gaza. It contends that Gaza's destruction illuminates the current conjuncture as an intensification of earlier authoritarian neoliberal tendencies.
Aleksandra Piletić
wiley +1 more source
New Results on Boomerang and Rectangle Attacks [PDF]
The boomerang attack is a new and very powerful cryptanalytic technique. However, due to the adaptive chosen plaintext and ciphertext nature of the attack, boomerang key recovery attacks that retrieve key material on both sides of the boomerang distinguisher are hard to mount.
Eli Biham, Orr Dunkelman, Nathan Keller
openaire +1 more source
ABSTRACT This paper reports on the excavation of a cache of stone artefacts, buried on the bank of a waterhole or ‘billabong’ in central western Queensland. This is an extremely rare find, and yet it is the second such site to be reported within less than a 10 km radius.
Yinika L. Perston +5 more
wiley +1 more source
Warning: Warnings Can Backfire Even When They Provide New and Important Information
ABSTRACT We clarify the conditions under which warnings that provide useful information backfire. Our analysis is based on three observations: (1) warnings can increase the attention given to the warned‐against behavior, (2) in many settings, counterproductive warned‐against behaviors (like texting while driving) are typically rewarding, and (3 ...
Ido Erev +3 more
wiley +1 more source
Hash Functions and the (Amplified) Boomerang Attack [PDF]
Since Crypto 2004, hash functions have been the target of many attacks which showed that several well-known functions such as SHA-0 or MD5 can no longer be considered secure collision free hash functions. These attacks use classical cryptographic techniques from block cipher analysis such as differential cryptanalysis together with some specific ...
Antoine Joux, Thomas Peyrin
openaire +1 more source
Turnover experiences in public accounting and alumni's decisions to “give back”
Abstract This study examines turnover experiences in public accounting, including the exit phase (from public accountants' initial thoughts of leaving to their exit) and the post‐exit phase (from their exit to the present moment) of the turnover process.
Lindsay M. Andiola +2 more
wiley +1 more source

