Results 71 to 80 of about 1,010 (133)
MergeMAC:A MAC for Authentication with Strict Time Constraints and Limited Bandwidth [PDF]
This paper presents MergeMAC, a MAC that is particularly suitable for environments with strict time requirements and extremely limited bandwidth. MergeMAC computes the MAC by splitting the message into two parts.
Ankele, Ralph +2 more
core +2 more sources
Abstract Evaluation and mitigation of the potential carcinogenic risks associated with nitrosamines in marketed pharmaceutical products are areas of interest for pharmaceutical companies and health authorities alike. Significant progress has been made to establish acceptable intake (AI) levels for N‐nitrosamine drug substance‐related impurities (NDSRIs)
Jennifer Cheung +7 more
wiley +1 more source
Abstract The objective of this population pharmacokinetic (PK) analysis was to characterize the concentration–time profile of brepocitinib plasma concentration after single‐ and multiple‐oral administration in healthy volunteers (HVs) and patients with immuno‐inflammatory diseases. Blood samples from phase I HV and phase II clinical studies of patients
Farzaneh Maleki +4 more
wiley +1 more source
Casimir effect for tachyonic fields
In this paper we examine Casimir effect in the case of tachyonic field, which is connected with particles with negative four-momentum square. We consider here only the case of one dimensional, scalar field.
A. A. Grib +17 more
core +1 more source
The related-key analysis of feistel constructions [PDF]
Lecture Notes in Computer Science, Volume 8540, 2015.It is well known that the classical three- and four-round Feistel constructions are provably secure under chosen-plaintext and chosen-ciphertext attacks, respectively.
A Biryukov +34 more
core +1 more source
Abstract As advanced treatments are becoming increasingly feasible in veterinary medicine, the evaluation of the health‐related quality of life (HRQOL) of treated animals is becoming more relevant. We evaluated owner‐perceived HRQOL of 10 dogs that underwent craniotomy for meningioma resection between 2002 and 2022 at our institution through telephone ...
Chiara Köcher +2 more
wiley +1 more source
A possibility to detect correlations between two quantum mechanical systems only from the information of a subsystem is investigated. For generic cases, we prove that there exist correlations between two quantum systems if the time-derivative of the ...
B. d’Espagnat +16 more
core +1 more source
Cheon's anholonomies in Floquet operators
Anholonomies in the parametric dependences of the eigenvalues and the eigenvectors of Floquet operators that describe unit time evolutions of periodically driven systems, e.g., kicked rotors, are studied.
A. Bohm +9 more
core +1 more source
Machine-checked proofs for cryptographic standards indifferentiability of SPONGE and secure high-assurance implementations of SHA-3 [PDF]
We present a high-assurance and high-speed implementation of the SHA-3 hash function. Our implementation is written in the Jasmin programming language, and is formally verified for functional correctness, provable security and timing attack resistance in
Almeida José Bacelar +19 more
core +8 more sources
Charge transport in nanochannels: a molecular theory
We introduce a theoretical and numerical method to investigate the flow of charged fluid mixtures under extreme confinement. We model the electrolyte solution as a ternary mixture, comprising two ionic species of opposite charge and a third uncharged ...
Marconi, Umberto Marini Bettolo +1 more
core +1 more source

