Results 11 to 20 of about 1,010 (133)
Crooked Indifferentiability of the Feistel Construction
The Feistel construction is a fundamental technique for building pseudorandom permutations and block ciphers. This paper shows that a simple adaptation of the construction is resistant, even to algorithm substitution attacks -- that is, adversarial subversion -- of the component round functions.
Russell, Alexander +2 more
openaire +3 more sources
Verified Indifferentiable Hashing into Elliptic Curves [PDF]
Many cryptographic systems based on elliptic curves are proven secure in the Random Oracle Model, assuming there exist probabilistic functions that map elements in some domain (e.g. bitstrings) onto uniformly and independently distributed points in a curve.
Barthe, Gilles +4 more
openaire +4 more sources
Symbolic Synthesis of Indifferentiability Attacks
We propose automated methods for synthesising attacks against indifferentiability, a powerful simulation-based notion of security commonly used to reason about symmetric-key constructions. Our methods are inspired from symbolic cryptography which is popular to reason about, e.g., cryptographic protocols.
Itsaka Rakotonirina +3 more
openaire +3 more sources
Abstract Coastal wetlands are naturally subjected to salinity, which is expected to increase through global climate changes. Most species will be affected by these changes, leading to major consequences for community structure and ecosystem functioning.
Léa Lorrain‐Soligon +3 more
wiley +1 more source
Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability [PDF]
Game-playing proofs constitute a powerful framework for non-quantum cryptographic security arguments, most notably applied in the context of indifferentiability. An essential ingredient in such proofs is lazy sampling of random primitives.
Czajkowski, Jan +3 more
core +1 more source
Resource-Restricted Indifferentiability [PDF]
A major general paradigm in cryptography is the following argument: Whatever an adversary could do in the real world, it could just as well do in the ideal world. The standard interpretation of “just as well” is that the translation from the real to the ideal world, usually called a simulator, is achieved by a probabilistic polynomial-time algorithm ...
Demay Grégory +3 more
openaire +1 more source
Parkinson's disease fluid biomarkers for differential diagnosis of atypical parkinsonian syndromes
Parkinson's disease (PD) and atypical parkinsonian syndromes (APS) are challenging to differentiate. Traditional biomarkers such as cerebrospinal fluid (CSF) alpha‐synuclein, Aβ42, and tau cannot distinguish PD and APS patients with confidence. CSF protein misfolding cyclic amplification, real‐time quaking‐induced conversion, and neurofilament light ...
Jun Yang +3 more
wiley +1 more source
The following study establishes a link between the various possibilities of CBD cluster size and fractal dimension that may eventualize during the mixing process of slurry preparation to the resulting microstructural properties and hence to the performance of Lithium‐Ion Batteries.
Anshuman Chauhan +3 more
wiley +1 more source
Progress management is an important scheme of construction management. In practical affairs, many unknown factors may lead to potential project delays and make the schedule risky. To address this issue, this paper proposes a data‐driven construction progress evaluation method that employs a probabilistic reliability analysis with BIM to effectively ...
Shen Zhang, Xingyu Wang, Loke Kok Foong
wiley +1 more source
Topological Appearance of Event Horizon: What Is the Topology of the Event Horizon That We Can See? [PDF]
The topology of the event horizon (TOEH) is usually believed to be a sphere. Nevertheless, some numerical simulations of gravitational collapse with a toroidal event horizon or the collision of event horizons are reported.
Siino, Masaru
core +2 more sources

