Results 81 to 90 of about 10,650 (191)

"All The Things We Could [Se]e by Now [Concerning Violence & Boko Haram], If Sigmund Freud's Wife was Your Mother": Psychoanalysis, Race, & International Political Theory [PDF]

open access: yes, 2017
In response to the sonic media and ludicrosity of her time, Hortense J. Spillers' paradigmatic essay ""All the Things You Could Be by Now, If Sigmund Freud's Wife Was Your Mother": Psychoanalysis and Race," transfigures Charles Mingus' melodic, cryptic ...
Ajishafe, Babajide I.
core  

MAJOR EFFECTS OF PSYOPS ON MILITARY ACTIONS [PDF]

open access: yesAnnals: Series on Military Sciences, 2017
Day by day, the international environment shows that psychological operations (PSYOPS) are absolutely essential in order to achieve success in a modern military operation.
Daniel POP
doaj  

Boomerang packet testing to mitigate wormhole attack in MANET

open access: yes, 2023
Abstract MANET is an infrastructure-less wireless technology used in various critical infrastructure areas such as the military environment, disaster management, etc. MANET is also subject to various security breaches. One such attack is the wormhole attack.
Rajkumar K, S mercy Shalinie
openaire   +1 more source

Decolonial and antiracist teacher education practice: Challenges and alternatives

open access: yesThe Modern Language Journal, Volume 109, Issue 3, Page 686-695, Autumn (Fall) 2025.
Abstract Decolonial and antiracist perspectives offer critical and humanizing approaches to supporting justice‐affirming language teacher education. In this commentary, we provide a conceptual grounding for decolonial and antiracist pedagogies as constitutive of justice‐affirming language education.
Ryuko Kubota, Suhanthie Motha
wiley   +1 more source

Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent [PDF]

open access: yes, 2001
We introduce a new cryptanalytic technique based on Wagner's boomerang and inside-out attacks. We first describe this new attack in terms of the original boomerang attack, and then demonstrate its use on reduced-round variants of the MARS core and Serpent. Our attack breaks eleven rounds of the MARS core with 265 chosen plaintexts, 270 memory, and 2229
John Kelsey   +2 more
openaire   +1 more source

War as a continuation of politics by other means... unmanned [PDF]

open access: yesJanus.net, 2014
The growth of US combat capability due to the operational introduction of drones is the most significant of any weapon system in recent decades. Under this new operating model, the drones are proliferating a myriad of essential activities in the battle ...
João Paulo Vicente
doaj  

A new S-box pattern generation based on chaotic enhanced logistic map: case of 5-bit S-box

open access: yesCybersecurity
Cryptography plays consistently an essential role in securing any sort of communications or data broadcast over the network. Since the security of any designed block cipher algorithm is related to its Substitution box (S-box), several efforts have been ...
Ismail El Gaabouri   +3 more
doaj   +1 more source

A Holistic Framework for Impossible Boomerang Attacks

open access: yesIACR Communications in Cryptology
In 2011, Lu introduced the impossible boomerang attack at DCC. This powerful cryptanalysis technique combines the strengths of the impossible differential and boomerang attacks, thereby inheriting the advantages of both cryptographic techniques. In this paper, we propose a holistic framework comprising two generic and effective algorithms and a MILP ...
Yincen Chen   +5 more
openaire   +1 more source

The Boomerang Attack on 5 and 6-Round Reduced AES [PDF]

open access: yes, 2005
In this note we study security of 128-bit key 10-round AES against the boomerang attack. We show attacks on AES reduced to 5 and 6 rounds, much faster than the exhaustive key search and twice faster than the “Square” attack of the AES designers. The attacks are structural and apply to other SPN ciphers with incomplete diffusion.
openaire   +2 more sources

The Boomerang Attacks on BLAKE and BLAKE2 [PDF]

open access: yes, 2015
In this paper, we study the security margins of hash functions BLAKE and BLAKE2 against the boomerang attack. We launch boomerang attacks on all four members of BLAKE and BLAKE2, and compare their complexities. We propose 8.5-round boomerang attacks on both BLAKE-512 and BLAKE2b with complexities \(2^{464}\) and \(2^{474}\) respectively.
openaire   +1 more source

Home - About - Disclaimer - Privacy