Results 11 to 20 of about 1,344 (196)

Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha

open access: diamondIACR Transactions on Symmetric Cryptology, 2017
ChaCha and Salsa are two software oriented stream ciphers that have attracted serious attention in academic as well as commercial domain. The most important cryptanalysis of reduced versions of these ciphers was presented by Aumasson et al.
Arka Rai Choudhuri, Subhamoy Maitra
doaj   +4 more sources

A Quantum Differential Attack on ChaCha and Related Resources Estimation

open access: goldIEEE Access
Existing classical cryptanalytic techniques against ChaCha primarily rely on differential cryptanalysis, leveraging probabilistic neutral bits (PNBs) introduced by Aumasson et al. Separately, Bathe et al.
Mintu Mandal   +2 more
doaj   +2 more sources

Sistem Layanan Informasi PT Chacha Networking System

open access: bronzeDewantara Journal of Technology, 2023
Sepertinya website sudah menjadi sebuah kebutuhan bagi setiap organisasi, instansi, perusahaan komersil, dan lain sebagainya. Kebutuhan tersebut biasanya tidak hanya untuk promosi, namun juga berbagai kegiatan lainnya. PT Chacha Networking System adalah perusahaan yang bergerak di bidang penyedia jasa internet atau Internet Service Provider sehingga ...
Mufti Nur Nazruddin   +2 more
openaire   +3 more sources

Cryptanalysis for reduced round Salsa and ChaCha: revisited [PDF]

open access: bronzeIET Information Security, 2019
Maitra et al . (WCC‐2015) proposed the characterisation of valid states by reversing the one round of Salsa20. When revisited, a mistake was found in the one bit change of eighth and ninth word while reversing the one round result to a valid initial state. It was mentioned in WCC‐2015 that it
Kakumani K.C. Deepthi, Kunwar Singh
openaire   +2 more sources

Belgisch socialisme en kolonisering: dépendance chacha? [PDF]

open access: bronzeBrood & Rozen, 2010
De houding van ‘links’ tegenover kolonisering is niet rechtlijnig. Bij Marx zelf was er reeds een ambivalentie tegenover de kolonisering: enerzijds vond hij dat de volkeren uit het Zuiden niet veel meer te verliezen hadden dan hun achterlijkheid, anderzijds klaagde hij de uitbuiting aan.
R. Doom
openaire   +3 more sources

Impact of Passive Solar Drying and Storage on Secondary Plant Metabolites and Nitrate Contents of Abyssinian Mustard, Amaranth, and Pumpkin Leaves. [PDF]

open access: yesJ Food Sci
ABSTRACT The present study compared the effect of passive direct solar dryer (PDSD) and passive indirect solar dryer (PISD), each followed by a 30‐day storage period, on the secondary plant metabolite and nitrate contents of amaranth, Abyssinian mustard, and pumpkin leaves.
Chacha JS   +4 more
europepmc   +2 more sources

Prevalence of Group A Streptococcal Pharyngitis and Antibiotic Susceptibility in Paediatric Patients With Sore Throats in Gaborone, Botswana. [PDF]

open access: yesTrop Med Int Health
ABSTRACT Background Group A β‐haemolytic Streptococcus, also known as Streptococcus pyogenes, commonly causes childhood pharyngitis and can lead to severe complications like acute rheumatic fever and rheumatic heart disease. Timely penicillin treatment is vital in preventing these issues.
Mwita JC   +4 more
europepmc   +2 more sources

Impact of Health Education Interventions for Control of <i>Taenia solium</i> Cysticercosis/Taeniasis in Endemic Countries: A Systematic Review. [PDF]

open access: yesPublic Health Chall
This systematic review assessed health education interventions for controlling Taenia solium taeniasis/cysticercosis. Of 392 studies screened, 21 met the inclusion criteria. Findings showed that community‐based education improved knowledge, attitudes and practices, with short‐term behavioural changes and reduced prevalence, although long‐term impact ...
Nyangi C   +4 more
europepmc   +2 more sources

Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system

open access: yesConnection Science, 2022
Internet of Things (IoT) devices require lower power consumption with higher security, which can be achieved by using lightweight cryptography (LWC) approaches. Attribute-based encryption (ABE) provides a fine-grained access control policy over encrypted
Mounika Jammula   +2 more
doaj   +1 more source

Rotational Cryptanalysis on ChaCha Stream Cipher

open access: yesSymmetry, 2022
In this paper we consider the ChaCha20 stream cipher in the related-key scenario and we study how to obtain rotational-XOR pairs with nonzero probability after the application of the first quarter round. The ChaCha20 input can be viewed as a 4×4 matrix of 32-bit words, where the first row of the matrix is fixed to a constant value, the second two rows ...
Stefano Barbero   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy