Results 31 to 40 of about 723,432 (288)

Airy, Beltrami, Maxwell, Morera, Einstein and Lanczos potentials revisited [PDF]

open access: yes, 2015
The main purpose of this paper is to revisit the well known potentials, called stress functions, needed in order to study the parametrizations of the stress equations, respectively provided by G.B.
Pommaret, Jean-François
core   +4 more sources

What Do Our Choices Say About Our Preferences?

open access: yes, 2021
Taking online decisions is a part of everyday life. Think of buying a house, parking a car or taking part in an auction. We often take those decisions publicly, which may breach our privacy - a party observing our choices may learn a lot about our ...
Grining, Krzysztof   +2 more
core  

Adaptive high-order splitting schemes for large-scale differential Riccati equations [PDF]

open access: yes, 2017
We consider high-order splitting schemes for large-scale differential Riccati equations. Such equations arise in many different areas and are especially important within the field of optimal control.
Stillfjord, Tony
core   +2 more sources

Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY

open access: yesIACR Transactions on Symmetric Cryptology, 2020
In this paper, a new method for evaluating the integral property, truncated and impossible differentials for substitution-permutation network (SPN) block ciphers is proposed. The main assumption is an explicit description/expression of the internal state
Wenying Zhang   +3 more
doaj   +1 more source

Whole lifespan microscopic observation of budding yeast aging through a microfluidic dissection platform [PDF]

open access: yes, 2012
Important insights into aging have been generated with the genetically tractable and short-lived budding yeast. However, it is still impossible today to continuously track cells by high-resolution microscopic imaging (e.g., fluorescent imaging ...
Barral   +25 more
core   +5 more sources

On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for SPN Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Among the few works realising the search of truncated differentials (TD) and multidimensional linear approximations (MDLA) holding for sure, the optimality of the distinguisher should be confirmed via an exhaustive search over all possible input ...
Ling Sun   +3 more
doaj   +1 more source

Identifying Student Difficulties with Entropy, Heat Engines, and the Carnot Cycle [PDF]

open access: yes, 2015
We report on several specific student difficulties regarding the Second Law of Thermodynamics in the context of heat engines within upper-division undergraduates thermal physics courses.
Christensen, Warren M.   +3 more
core   +5 more sources

LDAcoop: Integrating non‐linear population dynamics into the analysis of clonogenic growth in vitro

open access: yesMolecular Oncology, EarlyView.
Limiting dilution assays (LDAs) quantify clonogenic growth by seeding serial dilutions of cells and scoring wells for colony formation. The fraction of negative wells is plotted against cells seeded and analyzed using the non‐linear modeling of LDAcoop.
Nikko Brix   +13 more
wiley   +1 more source

Mind Your Path: On (Key) Dependencies in Differential Characteristics

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Cryptanalysts have been looking for differential characteristics in ciphers for decades and it remains unclear how the subkey values and more generally the Markov assumption impacts exactly their probability estimation.
Thomas Peyrin, Quan Quan Tan
doaj   +1 more source

The Impossible Differential Cryptanalysis [PDF]

open access: yes, 2017
V našej diplomovej práci sme sa venovali kryptoanalýze pomocou nemožných diferenciálov ako mierke na testovanie slabín šifier. Kvôli relatívnej novosti, oproti lineárnej a diferenciálnej analýze, nie je táto analýza veľmi známa a existuje len málo ...
Poljak Peter
core  

Home - About - Disclaimer - Privacy