Results 1 to 10 of about 2,489 (165)

Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM [PDF]

open access: yesCryptography, 2019
In this work, we focus on LS-design ciphers Fantomas, Robin, and iSCREAM. LS-designs are a family of bitslice ciphers aimed at efficient masked implementations against side-channel analysis.
Ashutosh Dhar Dwivedi   +2 more
exaly   +5 more sources

Fantomas 1921 – A Tale of a Lost American Movie Serial [PDF]

open access: yesBelphegor, 2013
Since its first publication in 1911, Fantômas has achieved iconic status all over the world, although it remains relatively unknown in America today. However, this has not always been the case.
David White
exaly   +4 more sources

Estudo da distribuição de doses utilizando Fantomas Antropomórficos e Dosímetros TL

open access: yesBrazilian Journal of Radiation Sciences
Este estudo avaliou a distribuição de doses em protocolos radioterápicos utilizando feixes de cone beam (100 kVp) e 6 MV em dois fantomas antropomórficos: um crânio impresso tridimensionalmente (3D) e o fantoma Alderson, com dosímetros ...
Telma Cristina Ferreira Fonseca
exaly   +4 more sources

Fantomas urbanos: cuerpos vigilados calles retratadas [PDF]

open access: yesAisthesis, 2012
Las primeras fotografías de ciudad tomadas en Chile, inicialmente por viajeros extranjeros, pueden ser leídas como el diseño espacial de una estrategia de ordenamiento sociopolítico.
Lorena Antezana Barrios   +1 more
doaj   +2 more sources

Alguien se pierde en el laberinto cosmicómico de Fantomas, ¿pero quién?

open access: yesIberoamericana. América Latina - España - Portugal, 2014
En junio de 1975, tan sólo cinco meses después de que Julio Cortázar participara en el Tribunal Russell de Bruselas, se publicó en México Fantomas contra los vampiros multinacionales: una utopía realizable narrada por Julio Cortázar, que incluía un ...
María de Lourdes Dávila
doaj   +2 more sources

Residual vulnerabilities to power side channel attacks of lightweight ciphers cryptography competition finalists

open access: yesIET Computers &Digital Techniques, Volume 17, Issue 3-4, Page 75-88, May-July 2023., 2023
A comprehensive evaluation of the seven (out of 10) algorithm finalists of the NIST IoT lightweight cipher competition that do not integrate built‐in countermeasures is proposed. The study shows that, nonetheless, they still present some residual vulnerabilities to power SCA.
Aurelien T. Mozipo, John M. Acken
wiley   +1 more source

Experimental evaluation of differential fault attack on lightweight block cipher PIPO

open access: yesIET Information Security, Volume 17, Issue 1, Page 80-88, January 2023., 2023
Abstract The recent development of Internet of Things (IoT) devices has increased related security issues. Because of the rapid increase in the use of these devices, the possibility of accessing and hijacking cryptographic devices is increasing. Consequently, active research on cryptographic technologies capable of providing a safe environment even in ...
SeongHyuck Lim, Dong‐Guk Han
wiley   +1 more source

LLSFIoT: Lightweight Logical Security Framework for Internet of Things

open access: yesWireless Communications and Mobile Computing, Volume 2021, Issue 1, 2021., 2021
Current research in Internet of Things (IoT) is focused on the security enhancements to every communicated message in the network. Keeping this thought in mind, researcher in this work emphasizes on a security oriented cryptographic solution. Commonly used security cryptographic solutions are heavy in nature considering their key size, operations, and ...
Isha Batra   +7 more
wiley   +1 more source

Evaluación de Modelo Docente Utilizando Fantomas de Bajo Costo para Entrenamiento en Reparación de Episiotomía.

open access: yesARS Medica, 2020
Introducción: El creciente aumento de los alumnos de pregrado, asociado a la disminución en el número de partos, han reducido la exposición de los alumnos a procedimientos como la episiotomí­a.
José Andrés Poblete   +6 more
doaj   +1 more source

Um método para voxelização de Geometrias 3D de malhas

open access: yesBrazilian Journal of Radiation Sciences, 2020
Modelos Computacionais de Exposicão (MCEs) utilizam fantomas acoplados a codigos Monte Carlo (MC) e simuladores de fontes emissoras de eletrons, positrons e fotons para estimar a dose absorvida por órgãos radiossensveis de indivduos expostos as radiações.
Pedro Avelino Andrade   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy