Results 21 to 30 of about 16,934 (147)

Statistical Model on CRAFT

open access: yesChinese Journal of Electronics, Volume 31, Issue 4, Page 698-712, July 2022., 2022
Many cryptanalytic techniques for symmetric‐key primitives rely on specific statistical analysis to extract some secrete key information from a large number of known or chosen plaintext‐ciphertext pairs. For example, there is a standard statistical model for differential cryptanalysis that determines the success probability and complexity of the attack
Caibing WANG   +3 more
wiley   +1 more source

Differential Cryptanalysis of Round-Reduced Sparx-64/128 [PDF]

open access: yes, 2018
Sparx is a family of ARX-based block ciphers designed according to the long-trail strategy (LTS) that were both introduced by Dinu et al. at ASIACRYPT'16.
Ankele, Ralph, List, Eik
core   +2 more sources

Polytopic Cryptanalysis [PDF]

open access: yes, 2016
Standard differential cryptanalysis uses statistical dependencies between the difference of two plaintexts and the difference of the respective two ciphertexts to attack a cipher.
A Biryukov   +25 more
core   +3 more sources

Operation Pillar of Defence and the 2013 Israeli elections: defensive or provocative intervention? [PDF]

open access: yes, 2014
Based on the research on the psychological and political effects of terrorism, this paper focuses on the possible use of provocative counter-terrorism operations in order to influence the outcome of elections.
Orenes, Philippse
core   +2 more sources

CMB Analysis [PDF]

open access: yes, 2001
We describe the subject of Cosmic Microwave Background (CMB) analysis - its past, present and future. The theory of Gaussian primary anisotropies, those arising from linear physics operating in the early Universe, is in reasonably good shape so the focus
Bond, J. Richard, Crittenden, Robert G.
core   +2 more sources

Education & countering violent extremism: western logics from South to North [PDF]

open access: yes, 2017
This paper explores the way education and conflict have become entangled during the post-9/11 ‘war on terror’ response to ‘radical Islam’ at home and abroad. The paper charts the complex ways that education has been deployed to serve Western military and
Novelli, Mario
core   +1 more source

Hannah Arendt's Ghosts:Reflections on the Disputable Path from Windhoek to Auschwitz [PDF]

open access: yes, 2009
Historians on both sides of the Atlantic are currently engaged in a controversy about the allegedly genocidal nature of western colonialism and its connections with the mass violence unleashed by Nazi Germany between 1939 and 1945.
Angrick   +112 more
core   +1 more source

Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [PDF]

open access: yes, 2006
Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without ...
Doumen, J.M., Hartel, P.H., Law, Y.W.
core   +3 more sources

Quantum Truncated Differential and Boomerang Attack [PDF]

open access: yesSymmetry
In order to design quantum-safe block ciphers, it is crucial to investigate the application of quantum algorithms to cryptographic analysis tools. In this study, we use the Bernstein–Vazirani algorithm to enhance truncated differential cryptanalysis and ...
Huiqin Xie, Li Yang
semanticscholar   +1 more source

The Predominant Role of Musical Valence Over Arousal in Pain Modulation: A Psychophysiological Study

open access: yesInternational Journal of Psychology, Volume 61, Issue 1, February 2026.
ABSTRACT Several studies have demonstrated the potential capacity of music to induce emotions and manage pain. However, the psychophysiological mechanisms underlying the effects of emotional dimensions (valence and arousal) induced by music on the modulation of pain perception remain poorly understood.
Veronika Diaz Abrahan   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy