Results 71 to 80 of about 3,394 (194)
Plaintext Recovery in DES-like Cryptosystems Based on S-boxes with Embedded Parity Check [PDF]
We describe an approach for recovering the plaintext in block ciphers having a design structure similar to the Data Encryption Standard but with improperly constructed S-boxes.
Angelova, Vesela, Borissov, Yuri
core
Abstract The Harbour porpoise (Phocoena phocoena) is a highly mobile cetacean species primarily occurring in coastal and shelf waters across the Northern hemisphere. It inhabits heterogeneous seascapes broadly varying in salinity and temperature. Here, we produced 74 whole genomes at intermediate coverage to study Harbour porpoise's evolutionary ...
Enrique Celemín +13 more
wiley +1 more source
This paper presents a unified framework for generic attacks on Generalized Feistel Ciphers, with a primary focus on Type 1, Type 2, and unbalanced contracting (U-Type 1) Feistel constructions with non-invertible round functions.
Betül Aşkın Özdemir, Vincent Rijmen
doaj +1 more source
Unbalanced Feistel networks and block cipher design [PDF]
We examine a generalization of the concept of Feistel networks, which we call Unbalanced Feistel Networks (UFNs). Like conventional Feistel networks, UFNs consist of a series of rounds in which one part of the block operates on the rest of the block. However, in a UFN the two parts need not be of equal size. Removing this limitation on Feistel networks
Bruce Schneier, John Kelsey
openaire +1 more source
Turbulence Characteristics of Ice‐Free Radiatively Driven Convection in a Deep, Unstratified Lake
Abstract This study examines data collected with an autonomous underwater glider during a period of vigorous radiatively driven convection (RDC) and low winds in deep, unstratified Lake Superior. Conductivity, temperature and depth (CTD) measurements reveal distinct convective plumes of warm downwelling water with temperature anomalies of ∼0.1° ${\sim}
Kenneth Larrieu +5 more
wiley +1 more source
LEE: Light‐Weight Energy‐Efficient encryption algorithm for sensor networks [PDF]
Data confidentiality in wireless sensor networks is mainly achieved by RC5 and Skipjack encryption algorithms. However, both algorithms have their weaknesses, for example RC5 supports variable-bit rotations, which are computationally expensive operations
Komninos, N. +2 more
core
Accounting for Compound Flooding Can Prevent Maladaptation—A Baltic Sea Case Study
Abstract Estuarine areas are currently at risk of compound flooding, the frequency and intensity of which is expected to increase with climate change. Even though efforts are made to adapt against single flood drivers using hard protection, potential subsequent changes in flood risk due to compound flooding are often overlooked in flood risk ...
Sunna Kupfer +2 more
wiley +1 more source
Similarity Property and Slide Attack of Block Cipher FESH
This paper focuses on similarity properties and extension of the classical slide property of block ciphers. Taking FESH, an award-winning block cipher of the National Cryptographic Algorithm Design Competition 2019, as an example, similarity properties ...
Yafei Zheng, Wenling Wu
doaj +1 more source
Dynamic MDS Matrices for Substantial Cryptographic Strength [PDF]
Ciphers get their strength from the mathematical functions of confusion and diffusion, also known as substitution and permutation. These were the basics of classical cryptography and they are still the basic part of modern ciphers.
Malik, Muhammad Yasir, No, Jong-Seon
core +2 more sources
Abstract Frozen sediment accumulations, including rock glaciers, talus, and moraines, constitute complex aquifers in permafrost‐affected terrain. The spatial distribution of permafrost ice largely governs the flow of water through the subsurface, which exhibits a spectrum of flow patterns, ranging from diffuse flow through a porous matrix to ...
Magdalena Seelig +3 more
wiley +1 more source

