Results 1 to 10 of about 2,332 (255)

Dobrica Cosic and Kosovo issue opening in 1968 [PDF]

open access: yesBaština, 2012
At the beginning of the sixties, Yugoslavia entered the period of relative foreign policy safety. Stable international position enabled introduction of questions of internal reforms.
Ristanović Petar
doaj   +1 more source

Novel Cosic resonance (standing wave) solutions for components of the JAK–STAT cellular signaling pathway: A convergence of spectral density profiles [PDF]

open access: goldFEBS Open Bio, 2015
Cosic discovered that spectral analyses of a protein sequence after each constituent amino acid had been transformed into an appropriate pseudopotential predicted a resonant energy between interacting molecules. Several experimental studies have verified the predicted peak wavelength of photons within the visible or near‐visible light band for specific
Nirosha J. Murugan   +2 more
openaire   +6 more sources

Correction to: Knowledge of the Culture of Safety in Cholecystectomy (COSIC) Among Surgical Residents: Do We Train Them Well For Future Practice? [PDF]

open access: yesWorld Journal of Surgery, 2021
An amendment to this paper has been published and can be accessed via the original article.
Vinay K. Kapoor   +4 more
openaire   +2 more sources

StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Fault attacks impose a serious threat against the practical implementations of cryptographic algorithms. Statistical Ineffective Fault Attacks (SIFA), exploiting the dependency between the secret data and the fault propagation overcame many of the known
Siemen Dhooghe   +2 more
doaj   +1 more source

Integral Cryptanalysis Using Algebraic Transition Matrices

open access: yesIACR Transactions on Symmetric Cryptology, 2023
In this work we introduce algebraic transition matrices as the basis for a new approach to integral cryptanalysis that unifies monomial trails (Hu et al., Asiacrypt 2020) and parity sets (Boura and Canteaut, Crypto 2016).
Tim Beyne, Michiel Verbauwhede
doaj   +1 more source

Cryptanalysis of Strong Physically Unclonable Functions

open access: yesIEEE Open Journal of the Solid-State Circuits Society, 2023
Physically unclonable functions (PUFs) are being proposed as a low-cost alternative to permanently store secret keys or provide device authentication without requiring nonvolatile memory, large e-fuses, or other dedicated processing steps.
Liliya Kraleva   +5 more
doaj   +1 more source

Threshold Implementations in Software: Micro-architectural Leakages in Algorithms

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the ...
John Gaspoz, Siemen Dhooghe
doaj   +1 more source

Cosic’s Resonance Recognition Model for Protein Sequences and Photon Emission Differentiates Lethal and Non-Lethal Ebola Strains: Implications for Treatment [PDF]

open access: yesOpen Journal of Biophysics, 2015
The Cosic Resonance Recognition Model (RRM) for amino acid sequences was applied to the classes of proteins displayed by four strains (Sudan, Zaire, Reston, Ivory Coast) of Ebola virus that produced either high or minimal numbers of human fatalities. The results clearly differentiated highly lethal and non-lethal strains.
Nirosha J. Murugan   +2 more
openaire   +2 more sources

An energy and area efficient, all digital entropy source compatible with modern standards based on jitter pipelining

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
This paper proposes an energy and area efficient entropy source, suitable for true random number generation, accompanied with a stochastic model in a 28nm CMOS technology.
Adriaan Peetermans, Ingrid Verbauwhede
doaj   +3 more sources

Multidimensional Linear Cryptanalysis of Feistel Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2023
This paper presents new generic attacks on Feistel ciphers that incorporate the key addition at the input of the non-invertible round function only.
Betül Aşkın Özdemir   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy