Results 91 to 100 of about 264,704 (267)
Structural Properties of Twisted Reed-Solomon Codes with Applications to Cryptography
We present a generalisation of Twisted Reed-Solomon codes containing a new large class of MDS codes. We prove that the code class contains a large subfamily that is closed under duality.
Beelen, Peter +3 more
core +1 more source
Tracking Motor Progression and Device‐Aided Therapy Eligibility in Parkinson's Disease
ABSTRACT Objective To characterise the progression of motor symptoms and identify eligibility for device‐aided therapies in Parkinson's disease, using both the 5‐2‐1 criteria and a refined clinical definition, while examining differences across genetic subgroups.
David Ledingham +7 more
wiley +1 more source
ABSTRACT Objective This study aims to identify both fluid and neuroimaging biomarkers for CSF1R‐RD that can inform the optimal timing of treatment administration to maximize therapeutic benefit, while also providing sensitive quantitative measurements to monitor disease progression.
Tomasz Chmiela +13 more
wiley +1 more source
FAST DISTINGUISHING ATTACK ON NTRUCipher + ENCRYPTION SCHEME
The NTRUCipher encryption system was proposed in 2017 as a symmetric version of the encryption scheme NTRUEncrypt, which is currently one of the fastest post-quantum cryptographic algorithms based on lattices in Euclidean space. The purpose of building NTRUCipher is to create a symmetric encryption scheme for practical applications, the security of ...
openaire +2 more sources
Reduced Muscular Carnosine in Proximal Myotonic Myopathy—A Pilot 1H‐MRS Study
ABSTRACT Objective Myotonic dystrophy type 2 (proximal myotonic myopathy, PROMM) is a progressive multisystem disorder with muscular symptoms (proximal weakness, pain, myotonia) and systemic manifestations such as diabetes mellitus, cataracts, and cardiac arrhythmias.
Alexander Gussew +11 more
wiley +1 more source
Improved integral attack——random linear distinguish and key recovery attack
Based on the integral attack and collision attack of four rounds of AES, a random linear distinguish attack against four rounds of SP block ciphers was proposed, which took advantage of the non-uniformity of linear biases’ distribution between some blocks of plaintext and inner state.Combined with precomputation, a key recovery attack against four ...
openaire +2 more sources
Acoustic Measures Capture Speech Dysfunction in Spinocerebellar Ataxia
ABSTRACT Objective Spinocerebellar ataxias (SCA) are hereditary cerebellar degenerative disorders with a common feature of dysarthria, involving impaired phonatory and articulatory control of speech, thereby affecting social communication. In this study, we investigated whether acoustic measures could objectively measure speech dysfunction and identify
Zena Fadel +5 more
wiley +1 more source
DDoS attack detection and defense based on hybrid deep learning model in SDN
Software defined network (SDN) is a new kind of network technology,and the security problems are the hot topics in SDN field,such as SDN control channel security,forged service deployment and external distributed denial of service (DDoS) attacks.Aiming ...
Chuanhuang LI +4 more
doaj +2 more sources
Depletion-of-Battery Attack: Specificity, Modelling and Analysis
The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications.
Vladimir Shakhov, Insoo Koo
doaj +1 more source
This is a study of the security of the Coherent One-Way (COW) protocol for quantum cryptography, proposed recently as a simple and fast experimental scheme.
Branciard, Cyril +3 more
core

