Results 61 to 70 of about 10,636 (192)
Algebraic Techniques in Differential Cryptanalysis [PDF]
. In this paper we propose a new cryptanalytic method against block ciphers, which combines both algebraic and statistical techniques. More specifically, we show how to use algebraic relations arising from differential characteristics to speed up and ...
Albrecht, Martin, Cid, Carlos
core +5 more sources
New Results on Boomerang and Rectangle Attacks [PDF]
The boomerang attack is a new and very powerful cryptanalytic technique. However, due to the adaptive chosen plaintext and ciphertext nature of the attack, boomerang key recovery attacks that retrieve key material on both sides of the boomerang distinguisher are hard to mount.
Eli Biham, Orr Dunkelman, Nathan Keller
openaire +1 more source
A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej +4 more
wiley +1 more source
The Application of Fuzzy Logic Controller to Compute a Trust Level for Mobile Agents in a Smart Home [PDF]
Agents that travel through many hosts may cause a threat on the security of the visited hosts. Assets, system resources, and the reputation of the host are few possible targets for such an attack.
Abu, N.A. +4 more
core +1 more source
Matrix and cell‐associated proteoglycans are important tissue‐stabilizing, weight‐bearing, and tension‐resisting proteins in the intervertebral disc. Their glycosaminoglycan components have growth factor binding and cell‐instructive properties that allow cells to regulate tissue composition and function.
James Melrose
wiley +1 more source
To Share or Not to Share in Client-Side Encrypted Clouds
With the advent of cloud computing, a number of cloud providers have arisen to provide Storage-as-a-Service (SaaS) offerings to both regular consumers and business organizations.
Ateniese, Giuseppe, Wilson, Duane
core +1 more source
Hash Functions and the (Amplified) Boomerang Attack [PDF]
Since Crypto 2004, hash functions have been the target of many attacks which showed that several well-known functions such as SHA-0 or MD5 can no longer be considered secure collision free hash functions. These attacks use classical cryptographic techniques from block cipher analysis such as differential cryptanalysis together with some specific ...
Antoine Joux, Thomas Peyrin
openaire +1 more source
ABSTRACT No‐lift care may have comprehensive benefits for older adults with dementia or communication difficulties, not only by improving contractures and sleep quality, but also by positively influencing physical function, psychological well‐being, and social behavior.
Reiko Koyama +5 more
wiley +1 more source
Improved search models of boomerang distinguishers and application to LILLIPUT
Boomerang attack serves as a potent cryptanalytic tool for assessing the security of block ciphers. Over the past few years, various automatic search models for boomerang distinguishers have been proposed for block ciphers with different structures. This
Yunong Wu +6 more
doaj +1 more source
Understanding Terrorist Organizations with a Dynamic Model
Terrorist organizations change over time because of processes such as recruitment and training as well as counter-terrorism (CT) measures, but the effects of these processes are typically studied qualitatively and in separation from each other. Seeking a
A. Gutfraind +25 more
core +1 more source

