Results 61 to 70 of about 10,636 (192)

Algebraic Techniques in Differential Cryptanalysis [PDF]

open access: yes, 2008
. In this paper we propose a new cryptanalytic method against block ciphers, which combines both algebraic and statistical techniques. More specifically, we show how to use algebraic relations arising from differential characteristics to speed up and ...
Albrecht, Martin, Cid, Carlos
core   +5 more sources

New Results on Boomerang and Rectangle Attacks [PDF]

open access: yes, 2002
The boomerang attack is a new and very powerful cryptanalytic technique. However, due to the adaptive chosen plaintext and ciphertext nature of the attack, boomerang key recovery attacks that retrieve key material on both sides of the boomerang distinguisher are hard to mount.
Eli Biham, Orr Dunkelman, Nathan Keller
openaire   +1 more source

A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System

open access: yesJournal of Sensors, Volume 2026, Issue 1, 2026.
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej   +4 more
wiley   +1 more source

The Application of Fuzzy Logic Controller to Compute a Trust Level for Mobile Agents in a Smart Home [PDF]

open access: yes, 2009
Agents that travel through many hosts may cause a threat on the security of the visited hosts. Assets, system resources, and the reputation of the host are few possible targets for such an attack.
Abu, N.A.   +4 more
core   +1 more source

Intervertebral Disc Proteoglycans: Multifunctional Tissue Stabilizing and Instructional Cell Regulatory Proteins That Control Tissue Homeostasis

open access: yesJOR SPINE, Volume 8, Issue 4, December 2025.
Matrix and cell‐associated proteoglycans are important tissue‐stabilizing, weight‐bearing, and tension‐resisting proteins in the intervertebral disc. Their glycosaminoglycan components have growth factor binding and cell‐instructive properties that allow cells to regulate tissue composition and function.
James Melrose
wiley   +1 more source

To Share or Not to Share in Client-Side Encrypted Clouds

open access: yes, 2014
With the advent of cloud computing, a number of cloud providers have arisen to provide Storage-as-a-Service (SaaS) offerings to both regular consumers and business organizations.
Ateniese, Giuseppe, Wilson, Duane
core   +1 more source

Hash Functions and the (Amplified) Boomerang Attack [PDF]

open access: yes, 2007
Since Crypto 2004, hash functions have been the target of many attacks which showed that several well-known functions such as SHA-0 or MD5 can no longer be considered secure collision free hash functions. These attacks use classical cryptographic techniques from block cipher analysis such as differential cryptanalysis together with some specific ...
Antoine Joux, Thomas Peyrin
openaire   +1 more source

Comprehensive Benefits of No‐Lift Care in Older Adults With Dementia: Improvement in Contractures, Sleep Quality, and Psychosocial Function

open access: yesClinical Case Reports, Volume 13, Issue 11, November 2025.
ABSTRACT No‐lift care may have comprehensive benefits for older adults with dementia or communication difficulties, not only by improving contractures and sleep quality, but also by positively influencing physical function, psychological well‐being, and social behavior.
Reiko Koyama   +5 more
wiley   +1 more source

Improved search models of boomerang distinguishers and application to LILLIPUT

open access: yesCybersecurity
Boomerang attack serves as a potent cryptanalytic tool for assessing the security of block ciphers. Over the past few years, various automatic search models for boomerang distinguishers have been proposed for block ciphers with different structures. This
Yunong Wu   +6 more
doaj   +1 more source

Understanding Terrorist Organizations with a Dynamic Model

open access: yes, 2009
Terrorist organizations change over time because of processes such as recruitment and training as well as counter-terrorism (CT) measures, but the effects of these processes are typically studied qualitatively and in separation from each other. Seeking a
A. Gutfraind   +25 more
core   +1 more source

Home - About - Disclaimer - Privacy