Results 51 to 60 of about 164 (126)

Turbulence Characteristics of Ice‐Free Radiatively Driven Convection in a Deep, Unstratified Lake

open access: yesGeophysical Research Letters, Volume 52, Issue 7, 16 April 2025.
Abstract This study examines data collected with an autonomous underwater glider during a period of vigorous radiatively driven convection (RDC) and low winds in deep, unstratified Lake Superior. Conductivity, temperature and depth (CTD) measurements reveal distinct convective plumes of warm downwelling water with temperature anomalies of ∼0.1° ${\sim}
Kenneth Larrieu   +5 more
wiley   +1 more source

Towards Analyzable Design Paradigms for Chaos-Based Cryptographic Primitives

open access: yesJournal of Cybersecurity and Privacy
Although many chaos-based cryptosystems have been proposed over the past decade, they have yet to gain traction in real-world applications. A key reason for this is that most designs rely on security through obscurity, with unnecessarily complex ...
Abubakar Abba   +3 more
doaj   +1 more source

Integral and impossible‐differential attacks on the reduced‐round Lesamnta‐LW‐BC

open access: yesIET Information Security, 2022
Lesamnta‐LW‐BC is the internal block cipher of the Lesamnta‐LW lightweight hash function, specified in ISO/IEC 29192‐5:2016. It is based on the unbalanced Feistel network and Advanced Encryption Standard round function.
Rentaro Shiba   +4 more
doaj   +1 more source

Accounting for Compound Flooding Can Prevent Maladaptation—A Baltic Sea Case Study

open access: yesEarth's Future, Volume 13, Issue 2, February 2025.
Abstract Estuarine areas are currently at risk of compound flooding, the frequency and intensity of which is expected to increase with climate change. Even though efforts are made to adapt against single flood drivers using hard protection, potential subsequent changes in flood risk due to compound flooding are often overlooked in flood risk ...
Sunna Kupfer   +2 more
wiley   +1 more source

Analysis of Diffusion Properties in Generalized Feistel Ciphers Under Multidimensional Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology
This paper presents a unified framework for generic attacks on Generalized Feistel Ciphers, with a primary focus on Type 1, Type 2, and unbalanced contracting (U-Type 1) Feistel constructions with non-invertible round functions.
Betül Aşkın Özdemir, Vincent Rijmen
doaj   +1 more source

Hydraulics of Channelized Flow in Ice‐Supersaturated Debris: 1. Rock Glacier Hydrology in Alpine Glacial‐Periglacial Systems

open access: yesWater Resources Research, Volume 61, Issue 2, February 2025.
Abstract Frozen sediment accumulations, including rock glaciers, talus, and moraines, constitute complex aquifers in permafrost‐affected terrain. The spatial distribution of permafrost ice largely governs the flow of water through the subsurface, which exhibits a spectrum of flow patterns, ranging from diffuse flow through a porous matrix to ...
Magdalena Seelig   +3 more
wiley   +1 more source

Unbalanced Feistel networks and block cipher design [PDF]

open access: yes, 1996
We examine a generalization of the concept of Feistel networks, which we call Unbalanced Feistel Networks (UFNs). Like conventional Feistel networks, UFNs consist of a series of rounds in which one part of the block operates on the rest of the block. However, in a UFN the two parts need not be of equal size. Removing this limitation on Feistel networks
Bruce Schneier, John Kelsey
openaire   +1 more source

Interactions Between Diurnal Warm Layers and Surface‐Layer Fronts

open access: yesJournal of Geophysical Research: Oceans, Volume 130, Issue 1, January 2025.
Abstract Previous studies have highlighted the individual importance of diurnal warm layers (DWLs) and surface‐layer fronts within the surface boundary layer (SBL) in regulating energy, momentum, and gas exchange between the atmosphere and the ocean. This study investigates the interactions between DWLs and surface‐layer fronts using field observations
Jen‐Ping Peng   +8 more
wiley   +1 more source

A DNA‐Dynamic Permutation‐Diffusion Algorithm for Image Encryption Using Scaling Chaotification Models and Advanced DNA Operations

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
This paper proposes a DNA‐Dynamic Concurrent Permutation‐Diffusion Algorithm (DNA‐DCP‐DA) for secure image encryption, employing novel scaling chaotification models and advanced noncommutative DNA operations to address weaknesses in existing systems.
Mustafa Kamil Khairullah   +5 more
wiley   +1 more source

Similarity Property and Slide Attack of Block Cipher FESH

open access: yesIET Information Security, 2023
This paper focuses on similarity properties and extension of the classical slide property of block ciphers. Taking FESH, an award-winning block cipher of the National Cryptographic Algorithm Design Competition 2019, as an example, similarity properties ...
Yafei Zheng, Wenling Wu
doaj   +1 more source

Home - About - Disclaimer - Privacy