Results 71 to 80 of about 3,394 (194)

Plaintext Recovery in DES-like Cryptosystems Based on S-boxes with Embedded Parity Check [PDF]

open access: yes, 2013
We describe an approach for recovering the plaintext in block ciphers having a design structure similar to the Data Encryption Standard but with improperly constructed S-boxes.
Angelova, Vesela, Borissov, Yuri
core  

Evolutionary history and seascape genomics of Harbour porpoises (Phocoena phocoena) across environmental gradients in the North Atlantic and adjacent waters

open access: yesMolecular Ecology Resources, Volume 25, Issue 5, July 2025.
Abstract The Harbour porpoise (Phocoena phocoena) is a highly mobile cetacean species primarily occurring in coastal and shelf waters across the Northern hemisphere. It inhabits heterogeneous seascapes broadly varying in salinity and temperature. Here, we produced 74 whole genomes at intermediate coverage to study Harbour porpoise's evolutionary ...
Enrique Celemín   +13 more
wiley   +1 more source

Analysis of Diffusion Properties in Generalized Feistel Ciphers Under Multidimensional Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology
This paper presents a unified framework for generic attacks on Generalized Feistel Ciphers, with a primary focus on Type 1, Type 2, and unbalanced contracting (U-Type 1) Feistel constructions with non-invertible round functions.
Betül Aşkın Özdemir, Vincent Rijmen
doaj   +1 more source

Unbalanced Feistel networks and block cipher design [PDF]

open access: yes, 1996
We examine a generalization of the concept of Feistel networks, which we call Unbalanced Feistel Networks (UFNs). Like conventional Feistel networks, UFNs consist of a series of rounds in which one part of the block operates on the rest of the block. However, in a UFN the two parts need not be of equal size. Removing this limitation on Feistel networks
Bruce Schneier, John Kelsey
openaire   +1 more source

Turbulence Characteristics of Ice‐Free Radiatively Driven Convection in a Deep, Unstratified Lake

open access: yesGeophysical Research Letters, Volume 52, Issue 7, 16 April 2025.
Abstract This study examines data collected with an autonomous underwater glider during a period of vigorous radiatively driven convection (RDC) and low winds in deep, unstratified Lake Superior. Conductivity, temperature and depth (CTD) measurements reveal distinct convective plumes of warm downwelling water with temperature anomalies of ∼0.1° ${\sim}
Kenneth Larrieu   +5 more
wiley   +1 more source

LEE: Light‐Weight Energy‐Efficient encryption algorithm for sensor networks [PDF]

open access: yes, 2007
Data confidentiality in wireless sensor networks is mainly achieved by RC5 and Skipjack encryption algorithms. However, both algorithms have their weaknesses, for example RC5 supports variable-bit rotations, which are computationally expensive operations
Komninos, N.   +2 more
core  

Accounting for Compound Flooding Can Prevent Maladaptation—A Baltic Sea Case Study

open access: yesEarth's Future, Volume 13, Issue 2, February 2025.
Abstract Estuarine areas are currently at risk of compound flooding, the frequency and intensity of which is expected to increase with climate change. Even though efforts are made to adapt against single flood drivers using hard protection, potential subsequent changes in flood risk due to compound flooding are often overlooked in flood risk ...
Sunna Kupfer   +2 more
wiley   +1 more source

Similarity Property and Slide Attack of Block Cipher FESH

open access: yesIET Information Security, 2023
This paper focuses on similarity properties and extension of the classical slide property of block ciphers. Taking FESH, an award-winning block cipher of the National Cryptographic Algorithm Design Competition 2019, as an example, similarity properties ...
Yafei Zheng, Wenling Wu
doaj   +1 more source

Dynamic MDS Matrices for Substantial Cryptographic Strength [PDF]

open access: yes, 2011
Ciphers get their strength from the mathematical functions of confusion and diffusion, also known as substitution and permutation. These were the basics of classical cryptography and they are still the basic part of modern ciphers.
Malik, Muhammad Yasir, No, Jong-Seon
core   +2 more sources

Hydraulics of Channelized Flow in Ice‐Supersaturated Debris: 1. Rock Glacier Hydrology in Alpine Glacial‐Periglacial Systems

open access: yesWater Resources Research, Volume 61, Issue 2, February 2025.
Abstract Frozen sediment accumulations, including rock glaciers, talus, and moraines, constitute complex aquifers in permafrost‐affected terrain. The spatial distribution of permafrost ice largely governs the flow of water through the subsurface, which exhibits a spectrum of flow patterns, ranging from diffuse flow through a porous matrix to ...
Magdalena Seelig   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy