Results 61 to 70 of about 91,976 (334)
The Engima Cipher Machine [PDF]
There can be little doubt that the German “Enigma” was the best and safest mechanical cipher machine available in any country at the outbreak of the Second World War.
Wilson, Tony
core +1 more source
ABSTRACT Background We describe clinical and biologic characteristics of neuroblastoma in older children, adolescents, and young adults (OCAYA); describe survival outcomes in the post‐immunotherapy era; and identify if there is an age cut‐off that best discriminates outcomes.
Rebecca J. Deyell +14 more
wiley +1 more source
A New Guess-and-Determine Attack on the A5/1 Stream Cipher [PDF]
In Europe and North America, the most widely used stream cipher to ensure privacy and confidentiality of conversations in GSM mobile phones is the A5/1. In this paper, we present a new attack on the A5/1 stream cipher with an average time complexity of 2^
Mahalanobis, Ayan, Shah, Jay
core +1 more source
ABSTRACT Background Despite their increased risk for functional impairment resulting from cancer and its treatments, few adolescents and young adults (AYAs) with a hematological malignancy receive the recommended or therapeutic dose of exercise per week during inpatient hospitalizations.
Jennifer A. Kelleher +8 more
wiley +1 more source
Background As sequencing technology has advanced in recent years, a series of synapse-related gene variants have been reported to be associated with autism spectrum disorders (ASDs).
Qianyun Cai +6 more
doaj +1 more source
AES-CBC Software Execution Optimization
With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process.
Doma, Jayramsingh +2 more
core +1 more source
ABSTRACT Background Psychological safety (PS) is essential for teamwork, communication, and patient safety in complex healthcare environments. In pediatric oncology, interprofessional collaboration occurs under high emotional and organizational demands. Low PS may increase stress, burnout, and adverse events.
Alexandros Rahn +4 more
wiley +1 more source
The researcher has recently been working on the authenticity of information particularly with the use of cryptographic hash functions such as MD5 and Secure Hash Algorithm (SHA).
Francis G. Balazon
doaj +1 more source
The New Block Cipher Design (Tigris Cipher) [PDF]
Abstract—In the present paper we have proposed a new variant of AES cipher with high level of security and an elegant construction called TIGRIS cipher. The TIGRIS name has been derived from one of the two famous rivers in Iraq. The proposed TIGRIS cipher is a revision for the proposed Euphrates cipher which has already been published.
Omar A. Dawood +2 more
openaire +1 more source
This is the longer (partially unpublished) version of response; the shorter version (http://arxiv.org/abs/physics/0605013) is published in Physics Letters A.
Ambrózy +11 more
core +2 more sources

