Results 71 to 80 of about 2,921 (221)
A Note on 5-bit Quadratic Permutations’ Classification
Classification of vectorial Boolean functions up to affine equivalence is used widely to analyze various cryptographic and implementation properties of symmetric-key algorithms.
Dušan Božilov +2 more
doaj +1 more source
CF and CH Bond Activation Reactions of Fluorinated Molecules at Rhodium Pincer Complexes
Hydrido Rh pincer complexes showed C–F bond activation reactivity with a selectivity at the para position of pentafluoropyridine and octafluorotoluene. The C–H bond activation capability was unleashed by irradiation with UV light to obtain a deprotonated and coordinative unsaturated pincer complex intermediate as the active species.
Liza Marie Richter +2 more
wiley +1 more source
The Canary Down the Coalmine: Dagenham, London and Labour Politics
Abstract The history of Dagenham offers unique insights into both the changing composition of the working class and the forces that have reshaped domestic politics throughout the last 100 years, particularly the politics of the British labour movement.
Jon Cruddas
wiley +1 more source
Housing Since 1945: The Impact of Policy Change and Ideology
Abstract Housing policy in England has undergone significant reform on several occasions since 1945. Consensus approaches in the late 1940s and 50s to build large numbers of council houses and new private homes gave way to more ideologically driven policies in the 1970s and 80s.
Tony Travers
wiley +1 more source
Bit t-SNI Secure Multiplication Gadget for Inner Product Masking
Masking is a sound countermeasure to protect against differential power analysis. Since the work by Balasch et al. in ASIACRYPT 2012, inner product masking has been explored as an alternative to the well known Boolean masking.
John Gaspoz, Siemen Dhooghe
doaj +1 more source
Field Evidence on Nudging High School Students Towards Pro‐Environmental Behavior
ABSTRACT This paper contributes to the literature studying the effect of green nudges on the behavior of young people, particularly adolescents. We conducted a field experiment involving high school students to assess the effectiveness of a nudging strategy that aimed at motivating them to power off computers when they are not used in the classroom ...
Rustam Romaniuc +3 more
wiley +1 more source
Molecular basis for a pore block of Tentonin 3 expressed in HEK293 cells by a conopeptide, NMB‐1
Background and Purpose Tentonin 3 (TTN3/TMEM150C) is a mechanosensitive ion channel that plays critical roles in mechanotransduction processes. TTN3 forms a tetramer with a predicted rectangular shape and a central pore. A conotoxin ρ‐TIA and its synthetic analog, noxious mechanosensation blocker 1 (NMB‐1), were initially developed to inhibit slowly ...
Sujin Lim +10 more
wiley +1 more source
FINAL bootstrap acceleration on FPGA using DSP-free constant-multiplier NTTs
This work showcases Quatorze-bis, a state-of-the-art Number Theoretic Transform circuit for TFHE-like cryptosystems on FPGAs. It contains a novel modular multiplication design for modular multiplication with a constant for a constant modulus.
Jonas Bertels +2 more
doaj +1 more source
Security Analysis of BLAKE2’s Modes of Operation
BLAKE2 is a hash function introduced at ACNS 2013, which has been adopted in many constructions and applications. It is a successor to the SHA-3 finalist BLAKE, which received a significant amount of security analysis.
Atul Luykx, Bart Mennink, Samuel Neves
doaj +1 more source

