Results 21 to 30 of about 169,904 (225)

A method for fault recognition in the last three rounds of Advanced Encryption Standard

open access: yesElectronics Letters, 2021
A large number of studies are there for Advanced Encryption Standard (AES) fault attack analysis, but less for fault recognition. This paper presents a recognition method for single‐byte fault which is induced in the last three rounds of AES.
Huilong Jiang   +5 more
doaj   +1 more source

Computer-Aided Drug Design Applied to Marine Drug Discovery: Meridianins as Alzheimer’s Disease Therapeutic Agents

open access: yesMarine Drugs, 2017
Computer-aided drug discovery/design (CADD) techniques allow the identification of natural products that are capable of modulating protein functions in pathogenesis-related pathways, constituting one of the most promising lines followed in drug discovery.
Laura Llorach-Pares   +3 more
doaj   +1 more source

Faster Base64 Encoding and Decoding Using AVX2 Instructions [PDF]

open access: yes, 2009
Web developers use base64 formats to include images, fonts, sounds and other resources directly inside HTML, JavaScript, JSON and XML files. We estimate that billions of base64 messages are decoded every day. We are motivated to improve the efficiency of
Bruers, J J M   +5 more
core   +2 more sources

Kororamides, Convolutamines, and Indole Derivatives as Possible Tau and Dual-Specificity Kinase Inhibitors for Alzheimer’s Disease: A Computational Study

open access: yesMarine Drugs, 2018
Alzheimer’s disease (AD) is becoming one of the most disturbing health and socioeconomic problems nowadays, as it is a neurodegenerative pathology with no treatment, which is expected to grow further due to population ageing.
Laura Llorach-Pares   +3 more
doaj   +1 more source

Energy-efficient pipelined bloom filters for network intrusion detection [PDF]

open access: yes, 2006
This document is made available in accordance with publisher policies. Please cite only the published version using the reference above.
Kaya, I, Kocak, T
core   +3 more sources

Instrument-Free Point-of-Care Diagnostic for Leishmania Parasites

open access: yesDiagnostics
Background/Objective: Leishmaniasis is the second deadliest parasitic disease in the world, after malaria, with an estimated 1.6 million new cases each year.
Taralyn J. Wiggins   +7 more
doaj   +1 more source

Adiantum: length-preserving encryption for entry-level processors

open access: yesIACR Transactions on Symmetric Cryptology, 2018
We present HBSH, a simple construction for tweakable length-preserving encryption which supports the fastest options for hashing and stream encryption for processors without AES or other crypto instructions, with a provable quadratic advantage bound. Our
Paul Crowley, Eric Biggers
doaj   +1 more source

Jumble Java Byte Code to Measure the Effectiveness of Unit Tests [PDF]

open access: yes, 2007
Jumble is a byte code level mutation testing tool for Java which inter-operates with JUnit. It has been designed to operate in an industrial setting with large projects.
Cleary, John G.   +5 more
core   +2 more sources

Counter Mode Development for Block Cipher Operations [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2009
There are two basic types of symmetric algorithms: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer.
Ali Sagheer
doaj   +1 more source

HTTP adaptive streaming with media fragment URIs [PDF]

open access: yes, 2011
HTTP adaptive streaming was introduced with the general idea that user agents interpret a manifest file (describing different representations and segments of the media); where-after they retrieve the media content using sequential HTTP progressive ...
Mannens, Erik   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy