Results 11 to 20 of about 1,395,371 (292)
Cryptanalysis of a white‐box SM4 implementation based on collision attack
White‐box cryptography is to primarily protect the key of a cipher from being extracted in a white‐box scenario, where an adversary has full access to the execution environment of software implementation. Since the introduction of white‐box cryptography,
Rusi Wang +3 more
doaj +1 more source
Group mixing drives inequality in face-to-face gatherings
The emergence of inequality in social interactions can depend on a number of factors, among which the intrinsic attractiveness of individuals, but also group size the presence of pre-formed social ties.
Marcos Oliveira +5 more
doaj +1 more source
IntroductionThe COVID-19 pandemic, especially its early stages, sparked extensive discussions regarding the potential impact of metabolic and cardiovascular comorbidities on the severity and fatality of SARS-CoV-2 infection, yielding inconclusive ...
Jonathan Ariel López-Cuevas +7 more
doaj +1 more source
A Robust Version of Heged\H{u}s's Lemma, with Applications [PDF]
Heged\H{u}s's lemma is the following combinatorial statement regarding polynomials over finite fields. Over a field $\mathbb{F}$ of characteristic $p > 0$ and for $q$ a power of $p$, the lemma says that any multilinear polynomial $P\in \mathbb{F}[x_1 ...
Srikanth Srinivasan
doaj +1 more source
Computational complexity of μ calculation [PDF]
The structured singular value μ measures the robustness of uncertain systems. Numerous researchers over the last decade have worked on developing efficient methods for computing μ.
Braatz, Richard P. +3 more
core +3 more sources
Yoyo trick on type‐II generalised Feistel networks
This work presents a structural attack against the type‐II generalised Feistel network (GFN) with secret internal functions. First, equivalent structures of the 7‐round type‐II GFN are provided, which helps reduce the first guess of the secret round ...
Tao Hou, Ting Cui
doaj +1 more source
Computational Complexity in Electronic Structure [PDF]
In quantum chemistry, the price paid by all known efficient model chemistries is either the truncation of the Hilbert space or uncontrolled approximations.
Aaronson +80 more
core +3 more sources
Functional impact of multi-omic interactions in breast cancer subtypes
Multi-omic approaches are expected to deliver a broader molecular view of cancer. However, the promised mechanistic explanations have not quite settled yet. Here, we propose a theoretical and computational analysis framework to semi-automatically produce
Soledad Ochoa +3 more
doaj +1 more source
Computational Power Evaluation for Energy-Constrained Wireless Communications Systems
Estimating the power consumption and computational complexity of various digital signal processing (DSP) algorithms used in wireless communications systems is critical to assess the feasibility of implementing such algorithms in hardware, and for ...
Maryam Tariq +4 more
doaj +1 more source
Molecular mechanisms of multi-omic regulation in breast cancer
Breast cancer is a complex disease that is influenced by the concurrent influence of multiple genetic and environmental factors. Recent advances in genomics and other high throughput biomolecular techniques (-omics) have provided numerous insights into ...
Soledad Ochoa +3 more
doaj +1 more source

