Results 41 to 50 of about 5,572,769 (345)
Cryptanalysis of Reduced round SKINNY Block Cipher
SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest hardware footprint. In this paper, we present zero-correlation linear approximations and the related-tweakey impossible differential characteristics for different ...
Sadegh Sadeghi +2 more
doaj +1 more source
Multidimensional Zero-Correlation Linear Cryptanalysis of the Block Cipher KASUMI [PDF]
The block cipher KASUMI is widely used for security in many synchronous wireless standards. It was proposed by ETSI SAGE for usage in 3GPP (3rd Generation Partnership Project) ciphering algorthms in 2001.
Chen, Shaozhen, Yi, Wentan
core
In lymphoid organs, antigen recognition and B cell receptor signaling rely on integrins and the cytoskeleton. Integrins act as mechanoreceptors, couple B cell receptor activation to cytoskeletal remodeling, and support immune synapse formation as well as antigen extraction.
Abhishek Pethe, Tanja Nicole Hartmann
wiley +1 more source
Zero correlation-integral attack of MIBS block cipher
MIBS is a lightweight block cipher for extremely constrained environments such as RFID tags and sensor networks. The MIBS algorithm's ability to resist zero correlation-integral analysis was evaluated. An 8-round zero corre-lation linear distinguisher of
Qing-cong LIU +3 more
doaj +2 more sources
Vulnerability association evaluation of Internet of thing devices based on attack graph
Device vulnerabilities emerge one after another in the Internet of thing environment, the attackers attack vulnerabilities on several low-level devices simultaneously by multi-step attack method to trigger the vulnerabilities on other high-level devices ...
Yao Ma +4 more
doaj +1 more source
B cells sense external mechanical forces and convert them into biochemical signals through mechanotransduction. Understanding how malignant B cells respond to physical stimuli represents a groundbreaking area of research. This review examines the key mechano‐related molecules and pathways in B lymphocytes, highlights the most relevant techniques to ...
Marta Sampietro +2 more
wiley +1 more source
A new type of Collusive Interest Flooding Attack (CIFA), Improved Collusive Interest Flooding Attack (I‐CIFA), which originates from CIFA with a stronger concealment, higher attack effect, lower attack cost, and wider attack range in Named Data ...
Meng Yue, Silin Peng, Wenzhi Feng
doaj +1 more source
Node Survival in Networks under Correlated Attacks
We study the interplay between correlations, dynamics, and networks for repeated attacks on a socio-economic network. As a model system we consider an insurance scheme against disasters that randomly hit nodes, where a node in need receives support from its network neighbors.
Dieter Armbruster +2 more
openaire +6 more sources
Circulating histones as clinical biomarkers in critically ill conditions
Circulating histones are emerging as promising biomarkers in critical illness due to their diagnostic, prognostic, and therapeutic potential. Detection methods such as ELISA and mass spectrometry provide reliable approaches for quantifying histone levels in plasma samples.
José Luis García‐Gimenez +17 more
wiley +1 more source
Host security assessment method based on attack graph
In order to solve the problems of inaccurate calculation of host security value and ignoring host correlation in attack graph, a host security assessment method based on attack graph was proposed.First, the host attack graph was generated to quantify the
Hongyu YANG, Haihang YUAN, Liang ZHANG
doaj +2 more sources

