Results 11 to 20 of about 981,149 (222)
A deleterious variant of FCHSD1 results in mTOR pathway overactivation and may cause porto‐sinusoidal vascular disorder (PSVD). The pedigree of the family demonstrated an autosomal dominant disease with variable expressivity. Whole‐genome sequencing and Sanger sequencing both validated the existence of the FCHSD1 variant and the heterozygosity of c ...
Jingxuan Shan +19 more
wiley +1 more source
Improved meet‐in‐the‐middle attacks on reduced‐round Joltik‐BC
Joltik‐BC is an internal tweakable block cipher of the authenticated encryption algorithm Joltik, which was a second‐round finalist in the CAESAR competition.
Manman Li, Shaozhen Chen
doaj +1 more source
Analyzing the Linear Keystream Biases in AEGIS
AEGIS is one of the authenticated encryption designs selected for the final portfolio of the CAESAR competition. It combines the AES round function and simple Boolean operations to update its large state and extract a keystream to achieve an excellent ...
Maria Eichlseder +2 more
doaj +1 more source
Practical Cube Attack against Nonce-Misused Ascon
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one of the winners of the CAESAR competition and one of the finalists of the NIST lightweight cryptography standardization effort.
Jules Baudrin +2 more
doaj +1 more source
The origins of the Romance analytic passive : evidence from word order [PDF]
This chapter argues that despite formal resemblances, Latin perfect tense BE-periphrases of the type amatus sum ‘I was loved’ are not the historical source of Romance present tense passives like Italian sono amato and French je suis aimé (both meaning ‘I
Danckaert, Lieven
core +3 more sources
Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks?
AEZ is a parallelizable, AES-based authenticated encryption algorithm that is well suited for software implementations on processors equipped with the AES-NI instruction set.
Colin Chaigneau, Henri Gilbert
doaj +1 more source
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our information infrastructure. In this paper, we provide the specification of Ascon-128 and Ascon-128a.
Christoph Dobraunig +3 more
semanticscholar +1 more source
Improved related‐tweakey rectangle attacks on round‐reduced Deoxys‐BC
Deoxys‐BC is the internal tweakable block cipher of the authenticated encryption (AE) Deoxys family, in which Deoxys‐II is the primary choice for the use case of ‘Defence in depth’ among the portfolio of CAESAR competition.
Jiamei Liu, Lin Tan, Hong Xu
doaj +1 more source
Guilt, Practical Identity, and Moral Staining [PDF]
The guilt left by immoral actions is why moral duties are more pressing and serious than other reasons like prudential considerations. Religions talk of sin and karma; the secular still speak of spots or stains.
Ingram, Andrew
core +1 more source
Distinguishing Attack on NORX Permutation
NORX is a permutation-based authentication scheme which is currently a third-round candidate of the ongoing CAESAR competition. The security bound of NORX is derived from the sponge construction applied to an ideal underlying permutation.
Tao Huang, Hongjun Wu
doaj +1 more source

