Results 31 to 40 of about 53,319 (274)
The concrete of numerous buildings and structures is at increased risk due to various kinds of aggressive pollutants. In this regard, it is necessary to implement and take additional actions, among which the so-called technological methods for concrete ...
Evgenii M. Shcherban’ +6 more
doaj +1 more source
Resistance of Ascon Family Against Conditional Cube Attacks in Nonce-Misuse Setting
Ascon family is one of the finalists of the National Institute of Standards and Technology (NIST) lightweight cryptography standardization process. The family includes three Authenticated Encryption with Associated Data (AEAD) schemes: Ascon-128 (primary)
Donghoon Chang +3 more
doaj +1 more source
A formal concept view of argumentation [PDF]
International audienceThe paper presents a parallel between two important theories for the treatment of information which address questions that are apparently unrelated and that are studied by different research communities: an enriched view of formal ...
A. Burusco +19 more
core +3 more sources
Cube-like Attack on Round-Reduced Initialization of Ketje Sr
This paper studies the Keccak-based authenticated encryption (AE) scheme Ketje Sr against cube-like attacks. Ketje is one of the remaining 16 candidates of third round CAESAR competition, whose primary recommendation is Ketje Sr.
Xiaoyang Dong +3 more
doaj +1 more source
With technical development and internet popularization, Internet of Things (IoT) technology is gaining a wider application in various fields. Key challenges in the growth of IoT are related to privacy and security. To avoid any possible malicious attacks,
Yu He, Gaoli Wang, Wenshan Li, Yizhi Ren
doaj +1 more source
Armor Damage of Overtopped Mound Breakwaters in Depth-Limited Breaking Wave Conditions
Armor damage due to wave attack is the principal failure mode to be considered when designing conventional mound breakwaters. Armor layers of mound breakwaters are typically designed using formulas in the literature for non-overtopped mound breakwaters ...
Patricia Mares-Nasarre +3 more
doaj +1 more source
A Secure Image Encryption Algorithm Based on Rubik's Cube Principle
In the past few years, several encryption algorithms based on chaotic systems have been proposed as means to protect digital images against cryptographic attacks.
Khaled Loukhaoukha +2 more
doaj +1 more source
Cube-Type Algebraic Attacks on Wireless Encryption Protocols [PDF]
Formally evaluating the strengths of a given cryptosystem will ensure that no flaws have crept into the application. During our investigation, we adopted Armknecht and Krause's approach to model the E0 encryption function, which does not depend on memory bits and will hold for every clock tick.
Petrakos, Nikolaos +3 more
openaire +4 more sources
A Cube Attack on a Reduced-Round Sycon
The cube attack was proposed at the 2009 Eurocrypt. The attack derives linear polynomials for specific output bits of a BlackBox cipher. Cube attacks target recovery keys or secret states. In this paper, we present a cube attack on a 5-round Sycon permutation and a 6-round Sycon permutation with a 320-bit state, whose rate occupies 96 bits, and whose ...
Minjeong Cho +3 more
openaire +1 more source
A New Application of Transient Recorder to Magnetic Measurements (Part I: Core Loss Measurement at Very Low Frequencies) [PDF]
A new method have been developed based upon analogue-to-digital conversion techniques and memories. The method involves the scaling of operating frequency from "real" to "optimum" for the power loss measurement.
Ishihara, Yoshiyuki +3 more
core +1 more source

