Results 51 to 60 of about 3,394 (194)
MiMC:Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity [PDF]
We explore cryptographic primitives with low multiplicative complexity. This is motivated by recent progress in practical applications of secure multi-party computation (MPC), fully homomorphic encryption (FHE), and zero-knowledge proofs (ZK) where ...
Albrecht, Martin +4 more
core +4 more sources
Eddy‐Induced Iron Transport Sustains the Biological Productivity in the Gulf of Alaska
Abstract The surface waters of the subarctic northeastern Pacific Ocean contain high concentrations of macronutrients such as phosphate and nitrate, which can potentially drive photosynthesis and biological uptake of carbon dioxide. Regional biological productivity, however, is limited by a lack of necessary micronutrients such as iron.
T. Ito +6 more
wiley +1 more source
This article presents a new algorithm to find MDS matrices that are well suited for use as a diffusion layer in lightweight block ciphers. Using an recursive construction, it is possible to obtain matrices with a very compact description. Classical field
Augot, Daniel, Finiasz, Matthieu
core +2 more sources
Differential Attacks by Algebraic Solving on a Series of HE‐Friendly Stream Ciphers
In recent years, many symmetric encryption ciphers have been proposed for homomorphic encryption (HE) applications. Rasta and its variants Masta and Pasta have gradually become a self‐contained series of HE‐friendly stream ciphers. The feature of these ciphers is that a fresh affine layer is randomly generated for each encryption.
Xichao Hu +5 more
wiley +1 more source
Design and Research of S-Box Based on Dynamic Strategy
Block cipher encryption is the mainstream method of information security application,and it has been widely used in wireless sensor networks.S-box which is one of the core modules of block cipher algorithm has a direct and significant impact on the ...
Zhouquan Du +4 more
doaj +2 more sources
Using Simon's Algorithm to Attack Symmetric-Key Cryptographic Primitives [PDF]
We present new connections between quantum information and the field of classical cryptography. In particular, we provide examples where Simon's algorithm can be used to show insecurity of commonly used cryptographic symmetric-key primitives ...
Santoli, Thomas, Schaffner, Christian
core +1 more source
Improvement of the Minimal‐Guess‐Basis MILP Model and Its Application to ESF
The guess‐and‐determine technique find wide applications in the recovery of unknown variables within given system of relations. The fundamental concept behind this technique involves guessing certain unknown variables and deducing the remaining ones based on the relational system.
Lingchen Li +5 more
wiley +1 more source
Multidimensional Zero-Correlation Linear Cryptanalysis of the Block Cipher KASUMI [PDF]
The block cipher KASUMI is widely used for security in many synchronous wireless standards. It was proposed by ETSI SAGE for usage in 3GPP (3rd Generation Partnership Project) ciphering algorthms in 2001.
Chen, Shaozhen, Yi, Wentan
core
Metabolism of Epoxidised Withanolides by a Generalist and a Specialist Insect Species
Larvae of Heliothis (Chloridea) virescence and subflexa have the ability to convert the epoxidized terpenoid 4β‐hydroxywithanolide E (4BHWE) to withanolide S. The conversion is found by feeding the larvae an artificial diet supplemented with 13C‐labeled 4BHWE.
Marie Pauline Sell +4 more
wiley +1 more source
A Brief Note on Supercooled Glacial Deep Waters
Abstract According to hydrographic profiles, approximately 2%–5% of the present‐day deep Southern Ocean contains supercooled waters that are below the freezing point. Which role these supercooled waters may have played under glacial conditions is an open question.
Miho Ishizu +2 more
wiley +1 more source

