Results 51 to 60 of about 164 (126)
Turbulence Characteristics of Ice‐Free Radiatively Driven Convection in a Deep, Unstratified Lake
Abstract This study examines data collected with an autonomous underwater glider during a period of vigorous radiatively driven convection (RDC) and low winds in deep, unstratified Lake Superior. Conductivity, temperature and depth (CTD) measurements reveal distinct convective plumes of warm downwelling water with temperature anomalies of ∼0.1° ${\sim}
Kenneth Larrieu +5 more
wiley +1 more source
Towards Analyzable Design Paradigms for Chaos-Based Cryptographic Primitives
Although many chaos-based cryptosystems have been proposed over the past decade, they have yet to gain traction in real-world applications. A key reason for this is that most designs rely on security through obscurity, with unnecessarily complex ...
Abubakar Abba +3 more
doaj +1 more source
Integral and impossible‐differential attacks on the reduced‐round Lesamnta‐LW‐BC
Lesamnta‐LW‐BC is the internal block cipher of the Lesamnta‐LW lightweight hash function, specified in ISO/IEC 29192‐5:2016. It is based on the unbalanced Feistel network and Advanced Encryption Standard round function.
Rentaro Shiba +4 more
doaj +1 more source
Accounting for Compound Flooding Can Prevent Maladaptation—A Baltic Sea Case Study
Abstract Estuarine areas are currently at risk of compound flooding, the frequency and intensity of which is expected to increase with climate change. Even though efforts are made to adapt against single flood drivers using hard protection, potential subsequent changes in flood risk due to compound flooding are often overlooked in flood risk ...
Sunna Kupfer +2 more
wiley +1 more source
This paper presents a unified framework for generic attacks on Generalized Feistel Ciphers, with a primary focus on Type 1, Type 2, and unbalanced contracting (U-Type 1) Feistel constructions with non-invertible round functions.
Betül Aşkın Özdemir, Vincent Rijmen
doaj +1 more source
Abstract Frozen sediment accumulations, including rock glaciers, talus, and moraines, constitute complex aquifers in permafrost‐affected terrain. The spatial distribution of permafrost ice largely governs the flow of water through the subsurface, which exhibits a spectrum of flow patterns, ranging from diffuse flow through a porous matrix to ...
Magdalena Seelig +3 more
wiley +1 more source
Unbalanced Feistel networks and block cipher design [PDF]
We examine a generalization of the concept of Feistel networks, which we call Unbalanced Feistel Networks (UFNs). Like conventional Feistel networks, UFNs consist of a series of rounds in which one part of the block operates on the rest of the block. However, in a UFN the two parts need not be of equal size. Removing this limitation on Feistel networks
Bruce Schneier, John Kelsey
openaire +1 more source
Interactions Between Diurnal Warm Layers and Surface‐Layer Fronts
Abstract Previous studies have highlighted the individual importance of diurnal warm layers (DWLs) and surface‐layer fronts within the surface boundary layer (SBL) in regulating energy, momentum, and gas exchange between the atmosphere and the ocean. This study investigates the interactions between DWLs and surface‐layer fronts using field observations
Jen‐Ping Peng +8 more
wiley +1 more source
This paper proposes a DNA‐Dynamic Concurrent Permutation‐Diffusion Algorithm (DNA‐DCP‐DA) for secure image encryption, employing novel scaling chaotification models and advanced noncommutative DNA operations to address weaknesses in existing systems.
Mustafa Kamil Khairullah +5 more
wiley +1 more source
Similarity Property and Slide Attack of Block Cipher FESH
This paper focuses on similarity properties and extension of the classical slide property of block ciphers. Taking FESH, an award-winning block cipher of the National Cryptographic Algorithm Design Competition 2019, as an example, similarity properties ...
Yafei Zheng, Wenling Wu
doaj +1 more source

