Results 11 to 20 of about 1,010 (133)

Crooked Indifferentiability of the Feistel Construction

open access: yes
The Feistel construction is a fundamental technique for building pseudorandom permutations and block ciphers. This paper shows that a simple adaptation of the construction is resistant, even to algorithm substitution attacks -- that is, adversarial subversion -- of the component round functions.
Russell, Alexander   +2 more
openaire   +3 more sources

Verified Indifferentiable Hashing into Elliptic Curves [PDF]

open access: yesJournal of Computer Security, 2012
Many cryptographic systems based on elliptic curves are proven secure in the Random Oracle Model, assuming there exist probabilistic functions that map elements in some domain (e.g. bitstrings) onto uniformly and independently distributed points in a curve.
Barthe, Gilles   +4 more
openaire   +4 more sources

Symbolic Synthesis of Indifferentiability Attacks

open access: yesProceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, 2022
We propose automated methods for synthesising attacks against indifferentiability, a powerful simulation-based notion of security commonly used to reason about symmetric-key constructions. Our methods are inspired from symbolic cryptography which is popular to reason about, e.g., cryptographic protocols.
Itsaka Rakotonirina   +3 more
openaire   +3 more sources

Some like it salty: Spatio‐temporal dynamics of salinity differentially affect anurans and caudates in coastal wetlands

open access: yesFreshwater Biology, Volume 68, Issue 7, Page 1279-1292, July 2023., 2023
Abstract Coastal wetlands are naturally subjected to salinity, which is expected to increase through global climate changes. Most species will be affected by these changes, leading to major consequences for community structure and ecosystem functioning.
Léa Lorrain‐Soligon   +3 more
wiley   +1 more source

Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability [PDF]

open access: yes, 2021
Game-playing proofs constitute a powerful framework for non-quantum cryptographic security arguments, most notably applied in the context of indifferentiability. An essential ingredient in such proofs is lazy sampling of random primitives.
Czajkowski, Jan   +3 more
core   +1 more source

Resource-Restricted Indifferentiability [PDF]

open access: yes, 2013
A major general paradigm in cryptography is the following argument: Whatever an adversary could do in the real world, it could just as well do in the ideal world. The standard interpretation of “just as well” is that the translation from the real to the ideal world, usually called a simulator, is achieved by a probabilistic polynomial-time algorithm ...
Demay Grégory   +3 more
openaire   +1 more source

Parkinson's disease fluid biomarkers for differential diagnosis of atypical parkinsonian syndromes

open access: yesClinical and Translational Discovery, Volume 3, Issue 1, February 2023., 2023
Parkinson's disease (PD) and atypical parkinsonian syndromes (APS) are challenging to differentiate. Traditional biomarkers such as cerebrospinal fluid (CSF) alpha‐synuclein, Aβ42, and tau cannot distinguish PD and APS patients with confidence. CSF protein misfolding cyclic amplification, real‐time quaking‐induced conversion, and neurofilament light ...
Jun Yang   +3 more
wiley   +1 more source

Influence of carbon binder domain on the performance of lithium‐ion batteries: Impact of size and fractal dimension

open access: yesElectrochemical Science Advances, Volume 3, Issue 1, February 2023., 2023
The following study establishes a link between the various possibilities of CBD cluster size and fractal dimension that may eventualize during the mixing process of slurry preparation to the resulting microstructural properties and hence to the performance of Lithium‐Ion Batteries.
Anshuman Chauhan   +3 more
wiley   +1 more source

Quantifying Schedule Delay Risk in Construction Projects: A Data‐Driven Approach with BIM and Probabilistic Reliability Analysis

open access: yesAdvances in Civil Engineering, Volume 2023, Issue 1, 2023., 2023
Progress management is an important scheme of construction management. In practical affairs, many unknown factors may lead to potential project delays and make the schedule risky. To address this issue, this paper proposes a data‐driven construction progress evaluation method that employs a probabilistic reliability analysis with BIM to effectively ...
Shen Zhang, Xingyu Wang, Loke Kok Foong
wiley   +1 more source

Topological Appearance of Event Horizon: What Is the Topology of the Event Horizon That We Can See? [PDF]

open access: yes, 1997
The topology of the event horizon (TOEH) is usually believed to be a sphere. Nevertheless, some numerical simulations of gravitational collapse with a toroidal event horizon or the collision of event horizons are reported.
Siino, Masaru
core   +2 more sources

Home - About - Disclaimer - Privacy