Results 81 to 90 of about 10,588 (175)

A two‐step authentication framework for Mobile ad hoc networks [PDF]

open access: yes, 2007
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to ...
Douligeris, C.   +2 more
core  

The nearly Newtonian regime in Non-Linear Theories of Gravity

open access: yes, 2005
The present paper reconsiders the Newtonian limit of models of modified gravity including higher order terms in the scalar curvature in the gravitational action. This was studied using the Palatini variational principle in [Meng X. and Wang P.: Gen. Rel.
A.A. Starobinsky   +18 more
core   +2 more sources

Predictability of the Onset of the Rainy Season Across Thailand: Mechanisms and Non‐Stationary Behaviour

open access: yesInternational Journal of Climatology, Volume 45, Issue 9, July 2025.
The onset of the rain season in Thailand in the late April–early May is highly predictable from ending ENSO events. The predictability is highly non‐stationary from 1950 due to subtle changes during warm ENSO events, which last longer and are more intense from 1980 onward.
Vincent Moron   +3 more
wiley   +1 more source

Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent [PDF]

open access: yes, 2001
We introduce a new cryptanalytic technique based on Wagner's boomerang and inside-out attacks. We first describe this new attack in terms of the original boomerang attack, and then demonstrate its use on reduced-round variants of the MARS core and Serpent. Our attack breaks eleven rounds of the MARS core with 265 chosen plaintexts, 270 memory, and 2229
John Kelsey   +2 more
openaire   +1 more source

War as a continuation of politics by other means... unmanned [PDF]

open access: yesJanus.net, 2014
The growth of US combat capability due to the operational introduction of drones is the most significant of any weapon system in recent decades. Under this new operating model, the drones are proliferating a myriad of essential activities in the battle ...
João Paulo Vicente
doaj  

A new S-box pattern generation based on chaotic enhanced logistic map: case of 5-bit S-box

open access: yesCybersecurity
Cryptography plays consistently an essential role in securing any sort of communications or data broadcast over the network. Since the security of any designed block cipher algorithm is related to its Substitution box (S-box), several efforts have been ...
Ismail El Gaabouri   +3 more
doaj   +1 more source

A Holistic Framework for Impossible Boomerang Attacks

open access: yesIACR Communications in Cryptology
In 2011, Lu introduced the impossible boomerang attack at DCC. This powerful cryptanalysis technique combines the strengths of the impossible differential and boomerang attacks, thereby inheriting the advantages of both cryptographic techniques. In this paper, we propose a holistic framework comprising two generic and effective algorithms and a MILP ...
Yincen Chen   +5 more
openaire   +1 more source

The Boomerang Attack on 5 and 6-Round Reduced AES [PDF]

open access: yes, 2005
In this note we study security of 128-bit key 10-round AES against the boomerang attack. We show attacks on AES reduced to 5 and 6 rounds, much faster than the exhaustive key search and twice faster than the “Square” attack of the AES designers. The attacks are structural and apply to other SPN ciphers with incomplete diffusion.
openaire   +2 more sources

The Boomerang Attacks on BLAKE and BLAKE2 [PDF]

open access: yes, 2015
In this paper, we study the security margins of hash functions BLAKE and BLAKE2 against the boomerang attack. We launch boomerang attacks on all four members of BLAKE and BLAKE2, and compare their complexities. We propose 8.5-round boomerang attacks on both BLAKE-512 and BLAKE2b with complexities \(2^{464}\) and \(2^{474}\) respectively.
openaire   +1 more source

Cryptanalysis of QARMAv2

open access: yesIACR Transactions on Symmetric Cryptology
QARMAv2 is a general-purpose and hardware-oriented family of lightweight tweakable block ciphers (TBCs) introduced in ToSC 2023. QARMAv2, as a redesign of QARMAv1 with a longer tweak and tighter security margins, is also designed to be suitable for ...
Hosein Hadipour, Yosuke Todo
doaj   +1 more source

Home - About - Disclaimer - Privacy