"All The Things We Could [Se]e by Now [Concerning Violence & Boko Haram], If Sigmund Freud's Wife was Your Mother": Psychoanalysis, Race, & International Political Theory [PDF]
In response to the sonic media and ludicrosity of her time, Hortense J. Spillers' paradigmatic essay ""All the Things You Could Be by Now, If Sigmund Freud's Wife Was Your Mother": Psychoanalysis and Race," transfigures Charles Mingus' melodic, cryptic ...
Ajishafe, Babajide I.
core
MAJOR EFFECTS OF PSYOPS ON MILITARY ACTIONS [PDF]
Day by day, the international environment shows that psychological operations (PSYOPS) are absolutely essential in order to achieve success in a modern military operation.
Daniel POP
doaj
Boomerang packet testing to mitigate wormhole attack in MANET
Abstract MANET is an infrastructure-less wireless technology used in various critical infrastructure areas such as the military environment, disaster management, etc. MANET is also subject to various security breaches. One such attack is the wormhole attack.
Rajkumar K, S mercy Shalinie
openaire +1 more source
Decolonial and antiracist teacher education practice: Challenges and alternatives
Abstract Decolonial and antiracist perspectives offer critical and humanizing approaches to supporting justice‐affirming language teacher education. In this commentary, we provide a conceptual grounding for decolonial and antiracist pedagogies as constitutive of justice‐affirming language education.
Ryuko Kubota, Suhanthie Motha
wiley +1 more source
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent [PDF]
We introduce a new cryptanalytic technique based on Wagner's boomerang and inside-out attacks. We first describe this new attack in terms of the original boomerang attack, and then demonstrate its use on reduced-round variants of the MARS core and Serpent. Our attack breaks eleven rounds of the MARS core with 265 chosen plaintexts, 270 memory, and 2229
John Kelsey +2 more
openaire +1 more source
War as a continuation of politics by other means... unmanned [PDF]
The growth of US combat capability due to the operational introduction of drones is the most significant of any weapon system in recent decades. Under this new operating model, the drones are proliferating a myriad of essential activities in the battle ...
João Paulo Vicente
doaj
A new S-box pattern generation based on chaotic enhanced logistic map: case of 5-bit S-box
Cryptography plays consistently an essential role in securing any sort of communications or data broadcast over the network. Since the security of any designed block cipher algorithm is related to its Substitution box (S-box), several efforts have been ...
Ismail El Gaabouri +3 more
doaj +1 more source
A Holistic Framework for Impossible Boomerang Attacks
In 2011, Lu introduced the impossible boomerang attack at DCC. This powerful cryptanalysis technique combines the strengths of the impossible differential and boomerang attacks, thereby inheriting the advantages of both cryptographic techniques. In this paper, we propose a holistic framework comprising two generic and effective algorithms and a MILP ...
Yincen Chen +5 more
openaire +1 more source
The Boomerang Attack on 5 and 6-Round Reduced AES [PDF]
In this note we study security of 128-bit key 10-round AES against the boomerang attack. We show attacks on AES reduced to 5 and 6 rounds, much faster than the exhaustive key search and twice faster than the “Square” attack of the AES designers. The attacks are structural and apply to other SPN ciphers with incomplete diffusion.
openaire +2 more sources
The Boomerang Attacks on BLAKE and BLAKE2 [PDF]
In this paper, we study the security margins of hash functions BLAKE and BLAKE2 against the boomerang attack. We launch boomerang attacks on all four members of BLAKE and BLAKE2, and compare their complexities. We propose 8.5-round boomerang attacks on both BLAKE-512 and BLAKE2b with complexities \(2^{464}\) and \(2^{474}\) respectively.
openaire +1 more source

