Results 31 to 40 of about 56,942 (262)
Grøstl Distinguishing Attack: A New Rebound Attack of an AES-like Permutation
We consider highly structured truncated differential paths to mount a new rebound attack on Grøstl-512, a hash functions based on two AES-like permutations, P1024 and Q1024, with non-square input and output registers.
Victor Cauchois +2 more
doaj +1 more source
Efficient Deep Learning Models for DGA Domain Detection
In recent years, cyberattacks using command and control (C&C) servers have significantly increased. To hide their C&C servers, attackers often use a domain generation algorithm (DGA), which automatically generates domain names for the C&C servers ...
Juhong Namgung +2 more
semanticscholar +1 more source
General Diffusion Analysis: How to Find Optimal Permutations for Generalized Type-II Feistel Schemes
Type-II Generalized Feistel Schemes are one of the most popular versions of Generalized Feistel Schemes. Their round function consists in applying a classical Feistel transformation to p sub-blocks of two consecutive words and then shifting the k = 2p ...
Victor Cauchois +2 more
doaj +1 more source
A topological introduction to knot contact homology [PDF]
This is a survey of knot contact homology, with an emphasis on topological, algebraic, and combinatorial aspects.Comment: 38 pages, based on lectures at the Contact and Symplectic Topology Summer School in Budapest, July 2012; v2: fixed typos, updated ...
Ng, Lenhard
core +1 more source
Transformator merupakan peralatan utama dalam pemasokan listrik dari unit pembangkitan menuju konsumen. Oleh karena itu, perlu perhatian khusus dalam pemeliharaan kinerja transformator agar tidak terjadi kerusakan pada transformator.
Abdul Syakur, Wildan Lazuardi
doaj +1 more source
A review of consumer awareness, understanding and use of food-based dietary guidelines [PDF]
Copyright @ 2011 Cambridge University PressFood-based dietary guidelines (FBDG) have primarily been designed for the consumer to encourage healthy, habitual food choices, decrease chronic disease risk and improve public health.
Achterberg +22 more
core +2 more sources
Field tests and computational simulations of the explosion of buried charges
Modelling buried explosion is a matter of concern for vehicle protection. Indeed, in the battlefield, Improvised Explosive Devices (IEDs) are one of the major threats for land vehicles and, more specifically, for their underbelly.
Roger Eve +2 more
doaj +1 more source
An Evaluation of DGA Classifiers [PDF]
Domain Generation Algorithms (DGAs) are a popular technique used by contemporary malware for command-and-control (C&C) purposes. Such malware utilizes DGAs to create a set of domain names that, when resolved, provide information necessary to establish a link to a C&C server.
Sivaguru, R. +5 more
openaire +3 more sources
Dental general anaesthetic receipt among Australians aged 15+ years, 1998–1999 to 2004–2005
Background Adults receive dental general anaesthetic (DGA) care when standard dental treatment is not possible. Receipt of DGA care is resource-intensive and not without risk.
Roberts-Thomson Kaye F, Jamieson Lisa M
doaj +1 more source
Global transcriptional profiling of tyramine and d-glucuronic acid catabolism in Salmonella
Salmonella has evolved various metabolic pathways to scavenge energy from the metabolic byproducts of the host gut microbiota, however, the precise metabolic byproducts and pathways utilized by Salmonella remain elusive.
Raquel Burin, Devendra H. Shah
doaj +1 more source

