Results 21 to 30 of about 981,149 (222)

Bounds for the Security of Ascon against Differential and Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The NIST Lightweight Cryptography project aims to standardize symmetric cryptographic designs, including authenticated encryption and hashing, suitable for constrained devices.
Johannes Erlacher   +2 more
doaj   +1 more source

Competition between antagonistic complement factors for a single protein on N. meningitidis rules disease susceptibility

open access: yeseLife, 2014
Genome-wide association studies have found variation within the complement factor H gene family links to host susceptibility to meningococcal disease caused by infection with Neisseria meningitidis (Davila et al., 2010).
Joseph J. E. Caesar   +10 more
semanticscholar   +1 more source

Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Being one of the winning algorithms of the CAESAR competition and currently a second round candidate of the NIST lightweight cryptography standardization project, the authenticated encryption scheme Ascon (designed by Dobraunig, Eichlseder, Mendel, and ...
Raghvendra Rohit   +3 more
doaj   +1 more source

Improved meet-in-the-middle attacks on reduced-round tweakable block ciphers Kiasu-BC and Deoxys-BC

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Tweakable block ciphers Kiasu-BC and Deoxys-BC are both the internal block ciphers of the candidates for the CAESAR authenticated encryption competition.
Zhangjun Ma, Manman Li, Shaozhen Chen
doaj   +1 more source

Exploring Differential-Based Distinguishers and Forgeries for ASCON

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Automated methods have become crucial components when searching for distinguishers against symmetric-key cryptographic primitives. While MILP and SAT solvers are among the most popular tools to model ciphers and perform cryptanalysis, other methods with ...
David Gerault   +2 more
doaj   +1 more source

Frequency-dependent and correlational selection pressures have conflicting consequences for assortative mating in a color-polymorphic lizard, Uta stansburiana [PDF]

open access: yes, 2014
Acknowledgments We would like to thank the numerous undergraduate researchers involved with this project for their invaluable assistance in lizard rearing and data collection. We also thank D. Haisten, A. Runemark, Y. Takahashi, and M.
Hipsley, Christy A   +3 more
core   +1 more source

The Latin Leaflet [PDF]

open access: yes, 1945
In the present work, we apply the asymptotic homogenization technique to the equations describing the dynamics of a heterogeneous material with evolving micro-structure, thereby obtaining a set of upscaled, effective equations.
University of Texas at Austin
core   +11 more sources

Impossible Differential Cryptanalysis of 8-Round Deoxys-BC-256

open access: yesIEEE Access, 2018
Deoxys is a third-round candidate of the CAESAR authenticated encryption competition. In this paper, we present the first cryptanalysis of Deoxys in the single-key model.
Zilong Jiang, Chenhui Jin
doaj   +1 more source

The Definition and Software Performance of Hashstream, a Fast Length-Flexible PRF

open access: yesCryptography, 2018
Two of the fastest types of cryptographic algorithms are the stream cipher and the almost-universal hash function. There are secure examples of each that process data in software using less than one CPU cycle per byte.
Ted Krovetz
doaj   +1 more source

Towards Tight Differential Bounds of Ascon

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Being one of the winners of the CAESAR competition and a finalist of the ongoing NIST lightweight cryptography competition, the authenticated encryption with associated data algorithm Ascon has withstood extensive security evaluation.
Rusydi H. Makarim, Raghvendra Rohit
doaj   +1 more source

Home - About - Disclaimer - Privacy