Results 51 to 60 of about 3,394 (194)

MiMC:Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity [PDF]

open access: yes, 2016
We explore cryptographic primitives with low multiplicative complexity. This is motivated by recent progress in practical applications of secure multi-party computation (MPC), fully homomorphic encryption (FHE), and zero-knowledge proofs (ZK) where ...
Albrecht, Martin   +4 more
core   +4 more sources

Eddy‐Induced Iron Transport Sustains the Biological Productivity in the Gulf of Alaska

open access: yesJournal of Geophysical Research: Oceans, Volume 131, Issue 2, February 2026.
Abstract The surface waters of the subarctic northeastern Pacific Ocean contain high concentrations of macronutrients such as phosphate and nitrate, which can potentially drive photosynthesis and biological uptake of carbon dioxide. Regional biological productivity, however, is limited by a lack of necessary micronutrients such as iron.
T. Ito   +6 more
wiley   +1 more source

Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions

open access: yes, 2013
This article presents a new algorithm to find MDS matrices that are well suited for use as a diffusion layer in lightweight block ciphers. Using an recursive construction, it is possible to obtain matrices with a very compact description. Classical field
Augot, Daniel, Finiasz, Matthieu
core   +2 more sources

Differential Attacks by Algebraic Solving on a Series of HE‐Friendly Stream Ciphers

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
In recent years, many symmetric encryption ciphers have been proposed for homomorphic encryption (HE) applications. Rasta and its variants Masta and Pasta have gradually become a self‐contained series of HE‐friendly stream ciphers. The feature of these ciphers is that a fresh affine layer is randomly generated for each encryption.
Xichao Hu   +5 more
wiley   +1 more source

Design and Research of S-Box Based on Dynamic Strategy

open access: yesDianxin kexue, 2015
Block cipher encryption is the mainstream method of information security application,and it has been widely used in wireless sensor networks.S-box which is one of the core modules of block cipher algorithm has a direct and significant impact on the ...
Zhouquan Du   +4 more
doaj   +2 more sources

Using Simon's Algorithm to Attack Symmetric-Key Cryptographic Primitives [PDF]

open access: yes, 2017
We present new connections between quantum information and the field of classical cryptography. In particular, we provide examples where Simon's algorithm can be used to show insecurity of commonly used cryptographic symmetric-key primitives ...
Santoli, Thomas, Schaffner, Christian
core   +1 more source

Improvement of the Minimal‐Guess‐Basis MILP Model and Its Application to ESF

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
The guess‐and‐determine technique find wide applications in the recovery of unknown variables within given system of relations. The fundamental concept behind this technique involves guessing certain unknown variables and deducing the remaining ones based on the relational system.
Lingchen Li   +5 more
wiley   +1 more source

Multidimensional Zero-Correlation Linear Cryptanalysis of the Block Cipher KASUMI [PDF]

open access: yes, 2014
The block cipher KASUMI is widely used for security in many synchronous wireless standards. It was proposed by ETSI SAGE for usage in 3GPP (3rd Generation Partnership Project) ciphering algorthms in 2001.
Chen, Shaozhen, Yi, Wentan
core  

Metabolism of Epoxidised Withanolides by a Generalist and a Specialist Insect Species

open access: yesChemistryOpen, Volume 14, Issue 12, December 2025.
Larvae of Heliothis (Chloridea) virescence and subflexa have the ability to convert the epoxidized terpenoid 4β‐hydroxywithanolide E (4BHWE) to withanolide S. The conversion is found by feeding the larvae an artificial diet supplemented with 13C‐labeled 4BHWE.
Marie Pauline Sell   +4 more
wiley   +1 more source

A Brief Note on Supercooled Glacial Deep Waters

open access: yesPaleoceanography and Paleoclimatology, Volume 40, Issue 12, December 2025.
Abstract According to hydrographic profiles, approximately 2%–5% of the present‐day deep Southern Ocean contains supercooled waters that are below the freezing point. Which role these supercooled waters may have played under glacial conditions is an open question.
Miho Ishizu   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy