Results 51 to 60 of about 17,540 (147)
An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity [PDF]
After the improvement by Courtois and Meier of the algebraic attacks on stream ciphers and the introduction of the related notion of algebraic immunity, several constructions of infinite classes of Boolean functions with optimum algebraic immunity have been proposed.
Claude Carlet, Keqin Feng
openaire +1 more source
Abstract This study examines the adaptive market hypothesis in the prewar and wartime Japanese stock market using a new market capitalization‐weighted price index. First, we find that the degree of market efficiency varies over time and with major historical events. This implies that the hypothesis is supported in this market.
Kenichi Hirayama, Akihiko Noda
wiley +1 more source
Isogeny-based post-quantum key exchange protocols [PDF]
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core
How Fast can be Algebraic Attacks on Block Ciphers?
In my talk I did overwiev the area of algebraic attacks on block ciphers, explain what fast algebraic attacks on block cipher are, and what results can already be achieved. This covers a vast amount of work (several papers, most of them not published) that I cannot include here in totality due to the lack of space.
openaire +3 more sources
Length-Based Attacks for Certain Group Based Encryption Rewriting Systems [PDF]
In this note, we describe a probabilistic attack on public key cryptosystems based on the word/conjugacy problems for finitely presented groups of the type proposed recently by Anshel, Anshel and Goldfeld.
Hughes, James, Tannenbaum, Allen
core +5 more sources
Polynomial-Time Key Recovery Attack on the Faure-Loidreau Scheme based on Gabidulin Codes
Encryption schemes based on the rank metric lead to small public key sizes of order of few thousands bytes which represents a very attractive feature compared to Hamming metric-based encryption schemes where public key sizes are of order of hundreds of ...
Gaborit, Philippe +2 more
core +3 more sources
ABSTRACT Lucid dreaming, defined as the experience of becoming aware of dreaming while dreaming, offers a unique window into a state of consciousness characterised by a blending of the sensory vividness of REM sleep with the self‐awareness of wakefulness. While past functional imaging has shed light on the neural activity supporting lucid dreaming, the
Nicola De Pisapia +4 more
wiley +1 more source
Abstract figure legend Schematic overview of the experimental and computational framework for investigating hiPSC‐CM electrophysiology with MEA systems. The MEA‐based model integrates experimental data with phenotype‐specific ionic models and tissue‐level heterogeneity.
Sofia Botti +2 more
wiley +1 more source
ABSTRACT Building on a quartz crystal microbalance with dissipation monitoring (QCM‐D), fouling in emulsion polymerization was compared between acrylate dispersions stabilized with a mobile, anionic surfactant and dispersions of poly(vinyl acetate‐co‐vinyl neodecanoate), PVAc, stabilized with polyvinyl alcohol, PVOH.
K. M. Hoffmann +5 more
wiley +1 more source
ABSTRACT We consider the problem of sequential (online) estimation of a single change point in a piecewise linear regression model under a Gaussian setup. We demonstrate that certain CUSUM‐type statistics attain the minimax optimal rates for localizing the change point.
Annika Hüselitz, Housen Li, Axel Munk
wiley +1 more source

