Results 1 to 10 of about 1,709 (155)
El artículo aborda una de las primeras obras de la artista chilena Nancy Gewölb (1939-), llamada “Fantomas o mi memoria incomunicada” realizada en el Centro Cultural Estación Mapocho en el año 1982, en medio de un contexto dictatorial marcado por la ...
Marla Freire Smith
doaj +2 more sources
Antecedentes: La eficacia de las máscaras faciales plomo-acrílicas atenuadoras de radiación utilizadas en cardiología intervencionista ha sido poco estudiada.
Alejandro Prieto-López +4 more
doaj +2 more sources
Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM
In this work, we focus on LS-design ciphers Fantomas, Robin, and iSCREAM. LS-designs are a family of bitslice ciphers aimed at efficient masked implementations against side-channel analysis.
Ashutosh Dhar Dwivedi +3 more
doaj +2 more sources
Introducción: El creciente aumento de los alumnos de pregrado, asociado a la disminución en el número de partos, han reducido la exposición de los alumnos a procedimientos como la episiotomía.
José Andrés Poblete +6 more
doaj +2 more sources
Estudo da distribuição de doses utilizando Fantomas Antropomórficos e Dosímetros TL
Este estudo avaliou a distribuição de doses em protocolos radioterápicos utilizando feixes de cone beam (100 kVp) e 6 MV em dois fantomas antropomórficos: um crânio impresso tridimensionalmente (3D) e o fantoma Alderson, com dosímetros ...
Pedro Henrique Dias Vieira +4 more
doaj +2 more sources
Modelos para práctica de ultrasonografía pediátrica con Fantomas caseros: Ideas y destrezas [PDF]
Karla Itzel Gutiérrez Riveroll +2 more
doaj +2 more sources
Fantômas: Understanding Face Anonymization Reversibility [PDF]
Face images are a rich source of information that can be used to identify individuals and infer private information about them. To mitigate this privacy risk, anonymizations employ transformations on clear images to obfuscate sensitive information, all ...
Julian Todt +2 more
semanticscholar +1 more source
A comprehensive evaluation of the seven (out of 10) algorithm finalists of the NIST IoT lightweight cipher competition that do not integrate built‐in countermeasures is proposed. The study shows that, nonetheless, they still present some residual vulnerabilities to power SCA.
Aurelien T. Mozipo, John M. Acken
wiley +1 more source
Experimental evaluation of differential fault attack on lightweight block cipher PIPO
Abstract The recent development of Internet of Things (IoT) devices has increased related security issues. Because of the rapid increase in the use of these devices, the possibility of accessing and hijacking cryptographic devices is increasing. Consequently, active research on cryptographic technologies capable of providing a safe environment even in ...
SeongHyuck Lim, Dong‐Guk Han
wiley +1 more source
LLSFIoT: Lightweight Logical Security Framework for Internet of Things
Current research in Internet of Things (IoT) is focused on the security enhancements to every communicated message in the network. Keeping this thought in mind, researcher in this work emphasizes on a security oriented cryptographic solution. Commonly used security cryptographic solutions are heavy in nature considering their key size, operations, and ...
Isha Batra +7 more
wiley +1 more source

