Results 21 to 30 of about 7,070 (136)
Related-key impossible boomerang cryptanalysis on LBlock
The related-key impossible boomerang cryptanalysis and the strength of the lightweight block cipher LBlock against this method were investigated.A new attack on 22-round LBlock was presented combining impossible boomerang attacks with related-key attacks.
Min XIE, Yan-li MU
doaj +2 more sources
Operation Pillar of Defence and the 2013 Israeli elections: defensive or provocative intervention? [PDF]
Based on the research on the psychological and political effects of terrorism, this paper focuses on the possible use of provocative counter-terrorism operations in order to influence the outcome of elections.
Orenes, Philippse
core +2 more sources
Understanding Terrorist Organizations with a Dynamic Model
Terrorist organizations change over time because of processes such as recruitment and training as well as counter-terrorism (CT) measures, but the effects of these processes are typically studied qualitatively and in separation from each other. Seeking a
A. Gutfraind +25 more
core +1 more source
Related-key impossible boomerang cryptanalysis on TWINE
In order to evaluate the security of the lightweight block cipher TWINE,the method of related-key impossible boomerang cryptanalysis was applied and a related-key impossible boomerang distinguisher consisting of 16-round and 17-round paths was ...
Min XIE, Feng TIAN, Jiaqi LI
doaj +2 more sources
The Polarization of the Cosmic Microwave Background Due to Primordial Gravitational Waves
We review current observational constraints on the polarization of the Cosmic Microwave Background (CMB), with a particular emphasis on detecting the signature of primordial gravitational waves.
ALEXANDER G. POLNAREV +11 more
core +1 more source
ABSTRACT This paper reports on the excavation of a cache of stone artefacts, buried on the bank of a waterhole or ‘billabong’ in central western Queensland. This is an extremely rare find, and yet it is the second such site to be reported within less than a 10 km radius.
Yinika L. Perston +5 more
wiley +1 more source
QARMAv2 is a general-purpose and hardware-oriented family of lightweight tweakable block ciphers (TBCs) introduced in ToSC 2023. QARMAv2, as a redesign of QARMAv1 with a longer tweak and tighter security margins, is also designed to be suitable for ...
Hosein Hadipour, Yosuke Todo
doaj +1 more source
The Predominant Role of Musical Valence Over Arousal in Pain Modulation: A Psychophysiological Study
ABSTRACT Several studies have demonstrated the potential capacity of music to induce emotions and manage pain. However, the psychophysiological mechanisms underlying the effects of emotional dimensions (valence and arousal) induced by music on the modulation of pain perception remain poorly understood.
Veronika Diaz Abrahan +3 more
wiley +1 more source
Fundamentals and Perspectives on Materials for Bifunctional Electrocatalysis
This review presents a comparative evaluation of key catalyst families for HER and OER, including MOFs, metal oxides, hydroxides/hydrides, carbon‐based materials, phosphides, and chalcogenides. Their electrochemical activity, stability, and commercialization potential are critically analyzed, with design strategies for hybrid catalysts also discussed ...
Iqra Fareed +8 more
wiley +1 more source
Logo in mainstream schools: the struggle over the soul of an educational innovation [PDF]
Technologies do not follow some predetermined and inevitable course from their context of production to their context of use, and technologies used in schools are no exception.
Agalianos, A +2 more
core +3 more sources

