Results 71 to 80 of about 211,629 (261)
The ΔRMSF$\Delta {\rm RMSF}$ analysis reveals significant flexibility differences between free NS3 and the NS2B/NS3 complex, with notable deviations in specific regions. Key residues driving NS2B binding are identified, and the protonation state of catalytic serine affects oxyanion hole formation.
Jurica Novak+2 more
wiley +1 more source
Abstract Racism, as a covert but pervasive presence in teacher education in England, remains a major structural issue and its effects on student teachers who are Black and Asian are real and troubling. Their personal stories reveal multiple challenges and present empirical evidence that can usefully be analysed to examine their experience of daily ...
Diane Warner
wiley +1 more source
Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing [PDF]
Cayley hash functions are based on a simple idea of using a pair of (semi)group elements, $A$ and $B$, to hash the 0 and 1 bit, respectively, and then to hash an arbitrary bit string in the natural way, by using multiplication of elements in the (semi ...
Bromberg, Lisa+2 more
core +1 more source
A generic attack to ciphers [PDF]
In this paper, we present a generic attack for ciphers, which is in essence a collision attack on the secret keys of ciphers .
arxiv
Adversarial collision attacks on image hashing functions [PDF]
Hashing images with a perceptual algorithm is a common approach to solving duplicate image detection problems. However, perceptual image hashing algorithms are differentiable, and are thus vulnerable to gradient-based adversarial attacks. We demonstrate that not only is it possible to modify an image to produce an unrelated hash, but an exact image ...
arxiv
Increasing half‐cycles intensifies turbulence due to enhanced vortex interactions and flow separation at the diverged‐outlets. Longer wavy ducts are shown to increase flow acceleration, resulting in greater output velocities and more turbulent‐kinetic‐energy production. Wave‐period plays a crucial role in determining turbulent intensity, with amplitude
I. L. Animasaun+2 more
wiley +1 more source
Yoyo trick on type‐II generalised Feistel networks
This work presents a structural attack against the type‐II generalised Feistel network (GFN) with secret internal functions. First, equivalent structures of the 7‐round type‐II GFN are provided, which helps reduce the first guess of the secret round ...
Tao Hou, Ting Cui
doaj +1 more source
Analysis of simple 2-D and 3-D metal structures subjected to fragment impact [PDF]
Theoretical methods were developed for predicting the large-deflection elastic-plastic transient structural responses of metal containment or deflector (C/D) structures to cope with rotor burst fragment impact attack.
Rodal, J. J. A.+3 more
core +1 more source
Mechanochemistry: Fundamental Principles and Applications
In this review, the physicochemical principles of mechanochemistry are first clarified. Based on this foundation, the research basis and cutting‐edge scientific achievements in four areas are introduced: solid‐state organic chemistry, polymers, interface science, and biomechanochemistry.
Liang Dong+4 more
wiley +1 more source
Proactive detection of DDOS attacks in Publish-Subscribe networks [PDF]
Information centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) or Publish-Subscribe Internet Technology (PURSUIT) has been proposed as an important candidate for the Internet of the future.
Alarfaj, Fawaz+4 more
core +2 more sources