Results 121 to 130 of about 1,402 (165)
Some of the next articles are maybe not open access.

Gli intolleranti e gli indifferenti

Religioni e società : XXX, 83, 2015, 2015
Sociologists have been deceived. Max Weber, one of the fathers of this discipline have assured that the process o secularization have gradually reduced the public impact of religions, limiting them to the private sphere. On the contrary in the third millennium, the religions still they have a collective importance in the public dimensions par ...
openaire   +2 more sources

Some Observations on Indifferentiability

2010
At Crypto 2005, Coron et al. introduced a formalism to study the presence or absence of structural flaws in iterated hash functions. If one cannot differentiate a hash function using ideal primitives from a random oracle, it is considered structurally sound, while the ability to differentiate it from a random oracle indicates a structural weakness ...
Ewan Fleischmann   +2 more
openaire   +1 more source

The Indifferentiability of the Duplex and Its Practical Applications

International Conference on the Theory and Application of Cryptology and Information Security, 2023
Jean Paul Degabriele   +2 more
semanticscholar   +1 more source

Alberto Moravia, "Gli indifferenti"

2007
L'edizione de "Gli indifferenti", pubblicata da Bompiani in occasione del centenario della nascita di Moravia come "nuova edizione ampliata", è introdotta da un saggio di S. Casini dal titolo "Il romanzo di una vita" (pp. 5-31). Tale introduzione ricostruisce in modo nuovo il rapporto tra lo scrittore e la sua opera prima, nella quale Moravia stesso ...
Casini, Simone, L. Desideri, T. Servillo
openaire   +1 more source

Improved Indifferentiable Security Analysis of PHOTON

2014
In this paper, we study the indifferentiable security of the domain extension algorithm of the PHOTON hash function that was proven to be indifferentiable from a random oracle up to \(\mathcal{O}(2^{\min\{ c/2, c^\prime/2 \}})\) query complexity, where c is the capacity in the absorbing step of PHOTON and c ′ is that in the squeezing step.
Yusuke Naito, Kazuo Ohta
openaire   +1 more source

Improved indifferentiability security proof for 3-round tweakable Luby–Rackoff

Designs, Codes and Cryptography, 2021
Ritam Bhaumik   +2 more
semanticscholar   +1 more source

Indifferentiable Security Reconsidered: Role of Scheduling

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011
In this paper, the substitutability of the indifferentiability framework with non-sequential scheduling is examined by reformulating the framework through applying the Task-PIOA framework, which provides non-sequential activation with oblivious task sequences.
openaire   +1 more source

Home - About - Disclaimer - Privacy