Results 41 to 50 of about 4,115,069 (292)

DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Reverse engineering of integrated circuits, i.e., understanding the internals of Integrated Circuits (ICs), is required for many benign and malicious applications.
Nils Albartus   +4 more
doaj   +1 more source

Gadget-based Masking of Streamlined NTRU Prime Decapsulation in Hardware

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Streamlined NTRU Prime is a lattice-based Key Encapsulation Mechanism (KEM) that is, together with X25519, the default algorithm in OpenSSH 9. Based on lattice assumptions, it is assumed to be secure also against attackers with access to< large-scale ...
Georg Land   +3 more
doaj   +1 more source

So No Damn Politician Ever Scrap It: The Constitutional Protection of Social Security Benefits [PDF]

open access: yes, 2004
Is the nation’s old-age pension system bankrupt? Each year brings repeated warnings of a need for immediate reform. Yet somehow, reasonable people and even experts dispute both the severity of the crises and the scope of the reforms, if any, that ought ...
Hawes, Matthew H.
core   +3 more sources

The MedSupport Multilevel Intervention to Enhance Support for Pediatric Medication Adherence: Development and Feasibility Testing

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction We developed MedSupport, a multilevel medication adherence intervention designed to address root barriers to medication adherence. This study sought to explore the feasibility and acceptability of the MedSupport intervention strategies to support a future full‐scale randomized controlled trial.
Elizabeth G. Bouchard   +8 more
wiley   +1 more source

Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Opaque predicates are a well-established fundamental building block for software obfuscation. Simplified, an opaque predicate implements an expression that provides constant Boolean output, but appears to have dynamic behavior for static analysis.
Max Hoffmann, Christof Paar
doaj   +1 more source

Can we Beat the Square Root Bound for ECDLP over 𝔽p2 via Representation?

open access: yesJournal of Mathematical Cryptology, 2020
We give a 4-list algorithm for solving the Elliptic Curve Discrete Logarithm (ECDLP) over some quadratic field 𝔽p2. Using the representation technique, we reduce ECDLP to a multivariate polynomial zero testing problem.
Delaplace Claire, May Alexander
doaj   +1 more source

Stereotactic Body Radiation Therapy for Pediatric, Adolescent, and Young Adult Patients With Osteosarcoma: Local Control Outcomes With Dosimetric Analysis

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background/Objectives Osteosarcoma is a radioresistant tumor that may benefit from stereotactic body radiation therapy (SBRT) for locoregional control in metastatic/recurrent disease. We report institutional practice patterns, outcomes, toxicity, and failures in osteosarcoma patients treated with SBRT.
Jenna Kocsis   +13 more
wiley   +1 more source

Scrutinising the secret state: parliamentary oversight of the intelligence and security agencies [PDF]

open access: yes, 2010
This article considers the growing parliamentary scrutiny of the intelligence and security agencies. It raises a number of questions about the role and effectiveness of the Intelligence and Security Committee, Parliament and ...
Bochel, Hugh   +2 more
core   +1 more source

Developmental Disorders in Children Recently Diagnosed With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Neurocognitive deficits in adult survivors of childhood cancer are well established, but less is known about developmental disorders (DD) arising shortly after cancer diagnosis. Using 2016–2019 linked Ohio cancer registry and Medicaid data, we compared DD among 324 children with cancer and 606,913 cancer‐free controls.
Jamie Shoag   +5 more
wiley   +1 more source

Nonmalleable Information Flow: Technical Report

open access: yes, 2017
Noninterference is a popular semantic security condition because it offers strong end-to-end guarantees, it is inherently compositional, and it can be enforced using a simple security type system.
Arden, Owen   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy