Results 21 to 30 of about 169,904 (225)
A method for fault recognition in the last three rounds of Advanced Encryption Standard
A large number of studies are there for Advanced Encryption Standard (AES) fault attack analysis, but less for fault recognition. This paper presents a recognition method for single‐byte fault which is induced in the last three rounds of AES.
Huilong Jiang +5 more
doaj +1 more source
Computer-aided drug discovery/design (CADD) techniques allow the identification of natural products that are capable of modulating protein functions in pathogenesis-related pathways, constituting one of the most promising lines followed in drug discovery.
Laura Llorach-Pares +3 more
doaj +1 more source
Faster Base64 Encoding and Decoding Using AVX2 Instructions [PDF]
Web developers use base64 formats to include images, fonts, sounds and other resources directly inside HTML, JavaScript, JSON and XML files. We estimate that billions of base64 messages are decoded every day. We are motivated to improve the efficiency of
Bruers, J J M +5 more
core +2 more sources
Alzheimer’s disease (AD) is becoming one of the most disturbing health and socioeconomic problems nowadays, as it is a neurodegenerative pathology with no treatment, which is expected to grow further due to population ageing.
Laura Llorach-Pares +3 more
doaj +1 more source
Energy-efficient pipelined bloom filters for network intrusion detection [PDF]
This document is made available in accordance with publisher policies. Please cite only the published version using the reference above.
Kaya, I, Kocak, T
core +3 more sources
Instrument-Free Point-of-Care Diagnostic for Leishmania Parasites
Background/Objective: Leishmaniasis is the second deadliest parasitic disease in the world, after malaria, with an estimated 1.6 million new cases each year.
Taralyn J. Wiggins +7 more
doaj +1 more source
Adiantum: length-preserving encryption for entry-level processors
We present HBSH, a simple construction for tweakable length-preserving encryption which supports the fastest options for hashing and stream encryption for processors without AES or other crypto instructions, with a provable quadratic advantage bound. Our
Paul Crowley, Eric Biggers
doaj +1 more source
Jumble Java Byte Code to Measure the Effectiveness of Unit Tests [PDF]
Jumble is a byte code level mutation testing tool for Java which inter-operates with JUnit. It has been designed to operate in an industrial setting with large projects.
Cleary, John G. +5 more
core +2 more sources
Counter Mode Development for Block Cipher Operations [PDF]
There are two basic types of symmetric algorithms: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer.
Ali Sagheer
doaj +1 more source
HTTP adaptive streaming with media fragment URIs [PDF]
HTTP adaptive streaming was introduced with the general idea that user agents interpret a manifest file (describing different representations and segments of the media); where-after they retrieve the media content using sequential HTTP progressive ...
Mannens, Erik +3 more
core +1 more source

