Results 61 to 70 of about 10,588 (175)

Improved search models of boomerang distinguishers and application to LILLIPUT

open access: yesCybersecurity
Boomerang attack serves as a potent cryptanalytic tool for assessing the security of block ciphers. Over the past few years, various automatic search models for boomerang distinguishers have been proposed for block ciphers with different structures. This
Yunong Wu   +6 more
doaj   +1 more source

Understanding Terrorist Organizations with a Dynamic Model

open access: yes, 2009
Terrorist organizations change over time because of processes such as recruitment and training as well as counter-terrorism (CT) measures, but the effects of these processes are typically studied qualitatively and in separation from each other. Seeking a
A. Gutfraind   +25 more
core   +1 more source

A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System

open access: yesJournal of Sensors, Volume 2026, Issue 1, 2026.
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej   +4 more
wiley   +1 more source

Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]

open access: yes, 2006
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core   +3 more sources

Intervertebral Disc Proteoglycans: Multifunctional Tissue Stabilizing and Instructional Cell Regulatory Proteins That Control Tissue Homeostasis

open access: yesJOR SPINE, Volume 8, Issue 4, December 2025.
Matrix and cell‐associated proteoglycans are important tissue‐stabilizing, weight‐bearing, and tension‐resisting proteins in the intervertebral disc. Their glycosaminoglycan components have growth factor binding and cell‐instructive properties that allow cells to regulate tissue composition and function.
James Melrose
wiley   +1 more source

Boomerang Attacks on Hash Function Using Auxiliary Differentials [PDF]

open access: yes, 2012
In this paper we study boomerang attacks in the chosen-key setting. This is particularly relevant to hash function analysis, since many boomerang attacks have been described against ARX-based designs. We present a new way to combine message modifications, or auxiliary differentials, with the boomerang attack.
Gaëtan Leurent, Arnab Roy
openaire   +3 more sources

Comprehensive Benefits of No‐Lift Care in Older Adults With Dementia: Improvement in Contractures, Sleep Quality, and Psychosocial Function

open access: yesClinical Case Reports, Volume 13, Issue 11, November 2025.
ABSTRACT No‐lift care may have comprehensive benefits for older adults with dementia or communication difficulties, not only by improving contractures and sleep quality, but also by positively influencing physical function, psychological well‐being, and social behavior.
Reiko Koyama   +5 more
wiley   +1 more source

Related-key impossible boomerang cryptanalysis on TWINE

open access: yesTongxin xuebao, 2019
In order to evaluate the security of the lightweight block cipher TWINE,the method of related-key impossible boomerang cryptanalysis was applied and a related-key impossible boomerang distinguisher consisting of 16-round and 17-round paths was ...
Min XIE, Feng TIAN, Jiaqi LI
doaj   +2 more sources

Trans‐Synaptic Virus Tracing Reveals Reciprocal Connections of the Interpeduncular Nucleus With the Mood, Exteroceptive, Interoceptive, and Motor Control Systems

open access: yesJournal of Comparative Neurology, Volume 533, Issue 11, November 2025.
The interpeduncular nucleus (IPN) in zebrafish plays a pivotal role in directional decision‐making, social conflict, and fear responses. The anterograde and retrograde connections of the dorsal and intermediate IPN are revealed through the use of monosynaptic and trans‐synaptic viral tracers.
Audrey K. Wong   +4 more
wiley   +1 more source

Quantum Truncated Differential and Boomerang Attack

open access: yesSymmetry
In order to design quantum-safe block ciphers, it is crucial to investigate the application of quantum algorithms to cryptographic analysis tools. In this study, we use the Bernstein–Vazirani algorithm to enhance truncated differential cryptanalysis and boomerang cryptanalysis.
Huiqin Xie, Li Yang
openaire   +2 more sources

Home - About - Disclaimer - Privacy