Results 51 to 60 of about 10,650 (191)

Impossible Boomerang Attack for Block Cipher Structures [PDF]

open access: yes, 2009
Impossible boomerang attack [5] (IBA) is a new variant of differential cryptanalysis against block ciphers. Evident from its name, it combines the ideas of both impossible differential cryptanalysis and boomerang attack. Though such an attack might not be the best attack available, its complexity is still less than that of the exhaustive search.
Jiali Choy, Huihui Yap
openaire   +1 more source

Dialogue of the Deaf: How Deliberation With Discontented Citizens May Hopelessly Fail

open access: yesPublic Administration, EarlyView.
ABSTRACT Governments employ public deliberation in response to citizen discontent, intending to achieve consensus, mutual understanding, and clarification. However, some studies suggest that deliberation can devolve into a “dialogue of the deaf,” where parties talk past each other, counterproductively leading to conflict, distrust, and confusion ...
Anouk van Twist
wiley   +1 more source

Priming Past the Primary: Mass Media, Issue Salience and Candidate Evaluation in a Race Governor [PDF]

open access: yes, 1993
Past research indicates that voters have begun to rely less on party affiliations and more on candidates\u27 images and positions on issues in making voting decisions.
Griffin, Robert J., Ph.D.   +1 more
core   +1 more source

Amplified Boomerang Attack against Reduced-Round SHACAL [PDF]

open access: yes, 2002
SHACAL is a 160-bit block cipher based on the hash standard SHA-1, as a submission to NESSIE. SHACAL uses the XOR, modular addition operation and the functions of bit-by-bit manner. These operations and functions make the differential cryptanalysis difficult, i.e, it is hard to find a long differential characteristic with high probability.
Jongsung Kim   +5 more
openaire   +1 more source

Theorising the Conjuncture Through Gaza: Urban Destruction and the Intensification of Authoritarian Neoliberalism

open access: yesAntipode, Volume 58, Issue 3, May 2026.
ABSTRACT This paper deploys a Gramscian theorisation of the conjuncture to argue that the contemporary global political economy is becoming constituted through the destruction of Gaza. It contends that Gaza's destruction illuminates the current conjuncture as an intensification of earlier authoritarian neoliberal tendencies.
Aleksandra Piletić
wiley   +1 more source

New Results on Boomerang and Rectangle Attacks [PDF]

open access: yes, 2002
The boomerang attack is a new and very powerful cryptanalytic technique. However, due to the adaptive chosen plaintext and ciphertext nature of the attack, boomerang key recovery attacks that retrieve key material on both sides of the boomerang distinguisher are hard to mount.
Eli Biham, Orr Dunkelman, Nathan Keller
openaire   +1 more source

Under the Shade of a Coolabah Tree: A Second Cache of Tulas From the Boulia District, Western Queensland

open access: yesArchaeology in Oceania, Volume 61, Issue 1, Page 39-54, April 2026.
ABSTRACT This paper reports on the excavation of a cache of stone artefacts, buried on the bank of a waterhole or ‘billabong’ in central western Queensland. This is an extremely rare find, and yet it is the second such site to be reported within less than a 10 km radius.
Yinika L. Perston   +5 more
wiley   +1 more source

Warning: Warnings Can Backfire Even When They Provide New and Important Information

open access: yesJournal of Behavioral Decision Making, Volume 39, Issue 2, April 2026.
ABSTRACT We clarify the conditions under which warnings that provide useful information backfire. Our analysis is based on three observations: (1) warnings can increase the attention given to the warned‐against behavior, (2) in many settings, counterproductive warned‐against behaviors (like texting while driving) are typically rewarding, and (3 ...
Ido Erev   +3 more
wiley   +1 more source

Hash Functions and the (Amplified) Boomerang Attack [PDF]

open access: yes, 2007
Since Crypto 2004, hash functions have been the target of many attacks which showed that several well-known functions such as SHA-0 or MD5 can no longer be considered secure collision free hash functions. These attacks use classical cryptographic techniques from block cipher analysis such as differential cryptanalysis together with some specific ...
Antoine Joux, Thomas Peyrin
openaire   +1 more source

Turnover experiences in public accounting and alumni's decisions to “give back”

open access: yesContemporary Accounting Research, Volume 43, Issue 1, Page 201-235, Spring 2026.
Abstract This study examines turnover experiences in public accounting, including the exit phase (from public accountants' initial thoughts of leaving to their exit) and the post‐exit phase (from their exit to the present moment) of the turnover process.
Lindsay M. Andiola   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy