Results 41 to 50 of about 16,934 (147)

An Assessment of Monazite Fission‐Track Thermochronology as a Proxy for Low‐Magnitude Cooling, Catalina‐Rincon Metamorphic Core Complex, AZ, USA

open access: yesGeochemistry, Geophysics, Geosystems, Volume 26, Issue 4, April 2025.
Abstract Conventional low‐temperature thermochronology can resolve rock cooling over geological timescales (>1 Myr) typically associated with ∼6–2 km of erosion, often induced by tectonic processes. Lower magnitude erosional events, however, produced by surface processes remain difficult to resolve.
Gilby Jepson   +10 more
wiley   +1 more source

Fanon, the body schema, and white solipsism

open access: yesThe Southern Journal of Philosophy, Volume 62, Issue 1, Page 110-123, March 2024.
Abstract Fanon's conception of the body schema plays a central role in his philosophy. The body schema is the body's “grasp” or “sense” of itself. Fanon argues that in the encounter between the Black and white person the body schema “crumbles,” so that the Black person experiences herself as object‐like in various ways.
Komarine Romdenh‐Romluc
wiley   +1 more source

MILP-Aided Related-Tweak/Key Impossible Differential Attack and its Applications to QARMA, Joltik-BC

open access: yesIEEE Access, 2019
In this paper, we study the relation of related-tweak/key impossible differentials with single-key ones. Following a heuristic strategy, we can derive longer related-tweak/key impossible differentials from single-key ones. We implement this strategy with
Rui Zong, Xiaoyang Dong
semanticscholar   +1 more source

New Differential‐Based Distinguishers for Ascon via Constraint Programming

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
As the winner of the NIST lightweight cryptography project, Ascon has undergone extensive self‐evaluation and third‐party cryptanalysis. In this paper, we use constraint programming (CP) as a tool to analyze the Ascon permutation and propose several differential‐based distinguishers.
Chan Song   +3 more
wiley   +1 more source

Multiple Impossible Differentials Attack on AES-192

open access: yesIEEE Access, 2019
The security of AES-192 against multiple impossible differentials attack is studied in this paper. Based on two types of impossible differentials for 4-round AES, two 7-round attack trails of AES-192 with the same plaintext and ciphertext difference ...
Zilong Jiang, Chenhui Jin, Zebin Wang
semanticscholar   +1 more source

Boomerang Packet Testing to Mitigate Wormhole Attack in MANET

open access: yesInternational Conference on Computing Communication and Networking Technologies
MANET is an infrastructure-less wireless technology used in various critical infrastructure areas such as the military environment, disaster management, etc. MANET is also subject to various security breaches.
K. Rajkumar   +3 more
semanticscholar   +1 more source

Towards a combined Rotational-Differential Cryptanalytic Framework [PDF]

open access: yes, 2014
In this report, we suggest a new cryptanalytic framework of constructing distinguishers which can be eventually extended to full attacks in the related-key scenario. We name this new paradigm as ”Relational Cryptanalysis”. The main idea is to exhibit the
Christofi, M.   +2 more
core  

"All The Things We Could [Se]e by Now [Concerning Violence & Boko Haram], If Sigmund Freud's Wife was Your Mother": Psychoanalysis, Race, & International Political Theory [PDF]

open access: yes, 2017
In response to the sonic media and ludicrosity of her time, Hortense J. Spillers' paradigmatic essay ""All the Things You Could Be by Now, If Sigmund Freud's Wife Was Your Mother": Psychoanalysis and Race," transfigures Charles Mingus' melodic, cryptic ...
Ajishafe, Babajide I.
core  

Logo in mainstream schools: the struggle over the soul of an educational innovation [PDF]

open access: yes, 2001
Technologies do not follow some predetermined and inevitable course from their context of production to their context of use, and technologies used in schools are no exception.
Agalianos, A   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy