Results 71 to 80 of about 2,921 (221)

A Note on 5-bit Quadratic Permutations’ Classification

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Classification of vectorial Boolean functions up to affine equivalence is used widely to analyze various cryptographic and implementation properties of symmetric-key algorithms.
Dušan Božilov   +2 more
doaj   +1 more source

CF and CH Bond Activation Reactions of Fluorinated Molecules at Rhodium Pincer Complexes

open access: yesZeitschrift für anorganische und allgemeine Chemie, EarlyView.
Hydrido Rh pincer complexes showed C–F bond activation reactivity with a selectivity at the para position of pentafluoropyridine and octafluorotoluene. The C–H bond activation capability was unleashed by irradiation with UV light to obtain a deprotonated and coordinative unsaturated pincer complex intermediate as the active species.
Liza Marie Richter   +2 more
wiley   +1 more source

The Canary Down the Coalmine: Dagenham, London and Labour Politics

open access: yesThe Political Quarterly, EarlyView.
Abstract The history of Dagenham offers unique insights into both the changing composition of the working class and the forces that have reshaped domestic politics throughout the last 100 years, particularly the politics of the British labour movement.
Jon Cruddas
wiley   +1 more source

Housing Since 1945: The Impact of Policy Change and Ideology

open access: yesThe Political Quarterly, EarlyView.
Abstract Housing policy in England has undergone significant reform on several occasions since 1945. Consensus approaches in the late 1940s and 50s to build large numbers of council houses and new private homes gave way to more ideologically driven policies in the 1970s and 80s.
Tony Travers
wiley   +1 more source

Bit t-SNI Secure Multiplication Gadget for Inner Product Masking

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Masking is a sound countermeasure to protect against differential power analysis. Since the work by Balasch et al. in ASIACRYPT 2012, inner product masking has been explored as an alternative to the well known Boolean masking.
John Gaspoz, Siemen Dhooghe
doaj   +1 more source

Field Evidence on Nudging High School Students Towards Pro‐Environmental Behavior

open access: yesBulletin of Economic Research, EarlyView.
ABSTRACT This paper contributes to the literature studying the effect of green nudges on the behavior of young people, particularly adolescents. We conducted a field experiment involving high school students to assess the effectiveness of a nudging strategy that aimed at motivating them to power off computers when they are not used in the classroom ...
Rustam Romaniuc   +3 more
wiley   +1 more source

Molecular basis for a pore block of Tentonin 3 expressed in HEK293 cells by a conopeptide, NMB‐1

open access: yesBritish Journal of Pharmacology, EarlyView.
Background and Purpose Tentonin 3 (TTN3/TMEM150C) is a mechanosensitive ion channel that plays critical roles in mechanotransduction processes. TTN3 forms a tetramer with a predicted rectangular shape and a central pore. A conotoxin ρ‐TIA and its synthetic analog, noxious mechanosensation blocker 1 (NMB‐1), were initially developed to inhibit slowly ...
Sujin Lim   +10 more
wiley   +1 more source

FINAL bootstrap acceleration on FPGA using DSP-free constant-multiplier NTTs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
This work showcases Quatorze-bis, a state-of-the-art Number Theoretic Transform circuit for TFHE-like cryptosystems on FPGAs. It contains a novel modular multiplication design for modular multiplication with a constant for a constant modulus.
Jonas Bertels   +2 more
doaj   +1 more source

Security Analysis of BLAKE2’s Modes of Operation

open access: yesIACR Transactions on Symmetric Cryptology, 2016
BLAKE2 is a hash function introduced at ACNS 2013, which has been adopted in many constructions and applications. It is a successor to the SHA-3 finalist BLAKE, which received a significant amount of security analysis.
Atul Luykx, Bart Mennink, Samuel Neves
doaj   +1 more source

Home - About - Disclaimer - Privacy