Dobrica Cosic and Kosovo issue opening in 1968 [PDF]
At the beginning of the sixties, Yugoslavia entered the period of relative foreign policy safety. Stable international position enabled introduction of questions of internal reforms.
Ristanović Petar
doaj +1 more source
Novel Cosic resonance (standing wave) solutions for components of the JAK–STAT cellular signaling pathway: A convergence of spectral density profiles [PDF]
Cosic discovered that spectral analyses of a protein sequence after each constituent amino acid had been transformed into an appropriate pseudopotential predicted a resonant energy between interacting molecules. Several experimental studies have verified the predicted peak wavelength of photons within the visible or near‐visible light band for specific
Nirosha J. Murugan+2 more
openaire +6 more sources
Correction to: Knowledge of the Culture of Safety in Cholecystectomy (COSIC) Among Surgical Residents: Do We Train Them Well For Future Practice? [PDF]
An amendment to this paper has been published and can be accessed via the original article.
Vinay K. Kapoor+4 more
openaire +2 more sources
StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations
Fault attacks impose a serious threat against the practical implementations of cryptographic algorithms. Statistical Ineffective Fault Attacks (SIFA), exploiting the dependency between the secret data and the fault propagation overcame many of the known
Siemen Dhooghe+2 more
doaj +1 more source
Integral Cryptanalysis Using Algebraic Transition Matrices
In this work we introduce algebraic transition matrices as the basis for a new approach to integral cryptanalysis that unifies monomial trails (Hu et al., Asiacrypt 2020) and parity sets (Boura and Canteaut, Crypto 2016).
Tim Beyne, Michiel Verbauwhede
doaj +1 more source
Cryptanalysis of Strong Physically Unclonable Functions
Physically unclonable functions (PUFs) are being proposed as a low-cost alternative to permanently store secret keys or provide device authentication without requiring nonvolatile memory, large e-fuses, or other dedicated processing steps.
Liliya Kraleva+5 more
doaj +1 more source
Threshold Implementations in Software: Micro-architectural Leakages in Algorithms
This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the ...
John Gaspoz, Siemen Dhooghe
doaj +1 more source
Cosic’s Resonance Recognition Model for Protein Sequences and Photon Emission Differentiates Lethal and Non-Lethal Ebola Strains: Implications for Treatment [PDF]
The Cosic Resonance Recognition Model (RRM) for amino acid sequences was applied to the classes of proteins displayed by four strains (Sudan, Zaire, Reston, Ivory Coast) of Ebola virus that produced either high or minimal numbers of human fatalities. The results clearly differentiated highly lethal and non-lethal strains.
Nirosha J. Murugan+2 more
openaire +2 more sources
This paper proposes an energy and area efficient entropy source, suitable for true random number generation, accompanied with a stochastic model in a 28nm CMOS technology.
Adriaan Peetermans, Ingrid Verbauwhede
doaj +3 more sources
Multidimensional Linear Cryptanalysis of Feistel Ciphers
This paper presents new generic attacks on Feistel ciphers that incorporate the key addition at the input of the non-invertible round function only.
Betül Aşkın Özdemir+2 more
doaj +1 more source