Results 21 to 30 of about 723,432 (288)
Differential expression analysis with global network adjustment [PDF]
<p>Background: Large-scale chromosomal deletions or other non-specific perturbations of the transcriptome can alter the expression of hundreds or thousands of genes, and it is of biological interest to understand which genes are most profoundly ...
A Antonellis +28 more
core +3 more sources
Impossible Differential Cryptanalysis of Zodiac [PDF]
We discuss the impossible differential cryptanalysis of the blockcipher Zodiac. The main design principles of Zodiac are simplicity and efficiency. However the diffusion layer in its round function is too simple to offer enough security. An impossible differential cryptanalysis is a proper method to attack the weakness of Zodiac.
Deukjo Hong +4 more
openaire +1 more source
Related-Key Impossible-Differential Attack on Reduced-Round Skinny [PDF]
At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with the NSA designs SIMON and SPECK.
Ankele, Ralph +6 more
core +2 more sources
Impossible Differential Cryptanalysis of CLEFIA [PDF]
This paper reports impossible differential cryptanalysis on the 128-bit block cipher CLEFIA that was proposed in 2007, including new 9-round impossible differentials for CLEFIA, and the result of an impossible differential attack using them. For the case of a 128-bit key, it is possible to apply the impossible differential attack to CLEFIA reduced to ...
Yukiyasu Tsunoo +5 more
openaire +1 more source
Analysis of an Optimal Fault Attack on the LED-64 Lightweight Cryptosystem
This paper presents an optimal method for recovering the secret keys of the light encryption device (LED) by combining the impossible differential fault attack with the algebraic differential fault attack. The proposed optimal method effectively improves
Liang Dong +5 more
doaj +1 more source
NBC is a family of block ciphers using Generalized Feistel structure, designed by Xu Hong et al. There are three block and key sizes,i.e.,128/128, 128/256 and 256/256. A 16-bit Sbox is involved in the cipher as the non-linear component.
Yang Jiangshuai +3 more
doaj +1 more source
Bit‐level evaluation of piccolo block cipher by satisfiability problem solver
In the field of symmetric key cryptography, the security against distinguishing attacks is one of the crucial security requirements. With advancements in computing capabilities and cryptanalysis techniques in recent years, more efficient methods have ...
Shion Utsumi +2 more
doaj +1 more source
Bridging the gap between the micro- and the macro-world of tumors [PDF]
At present it is still quite difficult to match the vast knowledge on the behavior of individual tumor cells with macroscopic measurements on clinical tumors.
Chignola, Roberto, Milotti, Edoardo
core +2 more sources
Quantum impossible differential and truncated differential cryptanalysis
Traditional cryptography is suffering a huge threat from the development of quantum computing. While many currently used public-key cryptosystems would be broken by Shor's algorithm, the effect of quantum computing on symmetric ones is still unclear. The security of symmetric ciphers relies heavily on the development of cryptanalytic tools.
Xie, Huiqin, Yang, Li
openaire +2 more sources
Universal Local symmetries and non-superposition in classical mechanics
In the Hilbert space formulation of classical mechanics (CM), pioneered by Koopman and von Neumann (KvN), there are potentially more observables that in the standard approach to CM.
Carlo Pagani +4 more
core +1 more source

