Results 1 to 10 of about 2,489 (165)
Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM [PDF]
In this work, we focus on LS-design ciphers Fantomas, Robin, and iSCREAM. LS-designs are a family of bitslice ciphers aimed at efficient masked implementations against side-channel analysis.
Ashutosh Dhar Dwivedi +2 more
exaly +5 more sources
Fantomas 1921 – A Tale of a Lost American Movie Serial [PDF]
Since its first publication in 1911, Fantômas has achieved iconic status all over the world, although it remains relatively unknown in America today. However, this has not always been the case.
David White
exaly +4 more sources
Estudo da distribuição de doses utilizando Fantomas Antropomórficos e Dosímetros TL
Este estudo avaliou a distribuição de doses em protocolos radioterápicos utilizando feixes de cone beam (100 kVp) e 6 MV em dois fantomas antropomórficos: um crânio impresso tridimensionalmente (3D) e o fantoma Alderson, com dosímetros ...
Telma Cristina Ferreira Fonseca
exaly +4 more sources
Fantomas urbanos: cuerpos vigilados calles retratadas [PDF]
Las primeras fotografías de ciudad tomadas en Chile, inicialmente por viajeros extranjeros, pueden ser leídas como el diseño espacial de una estrategia de ordenamiento sociopolítico.
Lorena Antezana Barrios +1 more
doaj +2 more sources
Alguien se pierde en el laberinto cosmicómico de Fantomas, ¿pero quién?
En junio de 1975, tan sólo cinco meses después de que Julio Cortázar participara en el Tribunal Russell de Bruselas, se publicó en México Fantomas contra los vampiros multinacionales: una utopía realizable narrada por Julio Cortázar, que incluía un ...
María de Lourdes Dávila
doaj +2 more sources
A comprehensive evaluation of the seven (out of 10) algorithm finalists of the NIST IoT lightweight cipher competition that do not integrate built‐in countermeasures is proposed. The study shows that, nonetheless, they still present some residual vulnerabilities to power SCA.
Aurelien T. Mozipo, John M. Acken
wiley +1 more source
Experimental evaluation of differential fault attack on lightweight block cipher PIPO
Abstract The recent development of Internet of Things (IoT) devices has increased related security issues. Because of the rapid increase in the use of these devices, the possibility of accessing and hijacking cryptographic devices is increasing. Consequently, active research on cryptographic technologies capable of providing a safe environment even in ...
SeongHyuck Lim, Dong‐Guk Han
wiley +1 more source
LLSFIoT: Lightweight Logical Security Framework for Internet of Things
Current research in Internet of Things (IoT) is focused on the security enhancements to every communicated message in the network. Keeping this thought in mind, researcher in this work emphasizes on a security oriented cryptographic solution. Commonly used security cryptographic solutions are heavy in nature considering their key size, operations, and ...
Isha Batra +7 more
wiley +1 more source
Introducción: El creciente aumento de los alumnos de pregrado, asociado a la disminución en el número de partos, han reducido la exposición de los alumnos a procedimientos como la episiotomía.
José Andrés Poblete +6 more
doaj +1 more source
Um método para voxelização de Geometrias 3D de malhas
Modelos Computacionais de Exposicão (MCEs) utilizam fantomas acoplados a codigos Monte Carlo (MC) e simuladores de fontes emissoras de eletrons, positrons e fotons para estimar a dose absorvida por órgãos radiossensveis de indivduos expostos as radiações.
Pedro Avelino Andrade +4 more
doaj +1 more source

