Results 21 to 30 of about 723,432 (288)

Differential expression analysis with global network adjustment [PDF]

open access: yes, 2013
<p>Background: Large-scale chromosomal deletions or other non-specific perturbations of the transcriptome can alter the expression of hundreds or thousands of genes, and it is of biological interest to understand which genes are most profoundly ...
A Antonellis   +28 more
core   +3 more sources

Impossible Differential Cryptanalysis of Zodiac [PDF]

open access: yes, 2002
We discuss the impossible differential cryptanalysis of the blockcipher Zodiac. The main design principles of Zodiac are simplicity and efficiency. However the diffusion layer in its round function is too simple to offer enough security. An impossible differential cryptanalysis is a proper method to attack the weakness of Zodiac.
Deukjo Hong   +4 more
openaire   +1 more source

Related-Key Impossible-Differential Attack on Reduced-Round Skinny [PDF]

open access: yes, 2017
At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with the NSA designs SIMON and SPECK.
Ankele, Ralph   +6 more
core   +2 more sources

Impossible Differential Cryptanalysis of CLEFIA [PDF]

open access: yes, 2008
This paper reports impossible differential cryptanalysis on the 128-bit block cipher CLEFIA that was proposed in 2007, including new 9-round impossible differentials for CLEFIA, and the result of an impossible differential attack using them. For the case of a 128-bit key, it is possible to apply the impossible differential attack to CLEFIA reduced to ...
Yukiyasu Tsunoo   +5 more
openaire   +1 more source

Analysis of an Optimal Fault Attack on the LED-64 Lightweight Cryptosystem

open access: yesIEEE Access, 2019
This paper presents an optimal method for recovering the secret keys of the light encryption device (LED) by combining the impossible differential fault attack with the algebraic differential fault attack. The proposed optimal method effectively improves
Liang Dong   +5 more
doaj   +1 more source

Cryptanalysis of NBC-128

open access: yesDianzi Jishu Yingyong, 2021
NBC is a family of block ciphers using Generalized Feistel structure, designed by Xu Hong et al. There are three block and key sizes,i.e.,128/128, 128/256 and 256/256. A 16-bit Sbox is involved in the cipher as the non-linear component.
Yang Jiangshuai   +3 more
doaj   +1 more source

Bit‐level evaluation of piccolo block cipher by satisfiability problem solver

open access: yesIET Information Security, 2023
In the field of symmetric key cryptography, the security against distinguishing attacks is one of the crucial security requirements. With advancements in computing capabilities and cryptanalysis techniques in recent years, more efficient methods have ...
Shion Utsumi   +2 more
doaj   +1 more source

Bridging the gap between the micro- and the macro-world of tumors [PDF]

open access: yes, 2012
At present it is still quite difficult to match the vast knowledge on the behavior of individual tumor cells with macroscopic measurements on clinical tumors.
Chignola, Roberto, Milotti, Edoardo
core   +2 more sources

Quantum impossible differential and truncated differential cryptanalysis

open access: yes, 2017
Traditional cryptography is suffering a huge threat from the development of quantum computing. While many currently used public-key cryptosystems would be broken by Shor's algorithm, the effect of quantum computing on symmetric ones is still unclear. The security of symmetric ciphers relies heavily on the development of cryptanalytic tools.
Xie, Huiqin, Yang, Li
openaire   +2 more sources

Universal Local symmetries and non-superposition in classical mechanics

open access: yes, 2010
In the Hilbert space formulation of classical mechanics (CM), pioneered by Koopman and von Neumann (KvN), there are potentially more observables that in the standard approach to CM.
Carlo Pagani   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy