Results 41 to 50 of about 4,115,069 (292)
DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering
Reverse engineering of integrated circuits, i.e., understanding the internals of Integrated Circuits (ICs), is required for many benign and malicious applications.
Nils Albartus +4 more
doaj +1 more source
Gadget-based Masking of Streamlined NTRU Prime Decapsulation in Hardware
Streamlined NTRU Prime is a lattice-based Key Encapsulation Mechanism (KEM) that is, together with X25519, the default algorithm in OpenSSH 9. Based on lattice assumptions, it is assumed to be secure also against attackers with access to< large-scale ...
Georg Land +3 more
doaj +1 more source
So No Damn Politician Ever Scrap It: The Constitutional Protection of Social Security Benefits [PDF]
Is the nation’s old-age pension system bankrupt? Each year brings repeated warnings of a need for immediate reform. Yet somehow, reasonable people and even experts dispute both the severity of the crises and the scope of the reforms, if any, that ought ...
Hawes, Matthew H.
core +3 more sources
ABSTRACT Introduction We developed MedSupport, a multilevel medication adherence intervention designed to address root barriers to medication adherence. This study sought to explore the feasibility and acceptability of the MedSupport intervention strategies to support a future full‐scale randomized controlled trial.
Elizabeth G. Bouchard +8 more
wiley +1 more source
Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead
Opaque predicates are a well-established fundamental building block for software obfuscation. Simplified, an opaque predicate implements an expression that provides constant Boolean output, but appears to have dynamic behavior for static analysis.
Max Hoffmann, Christof Paar
doaj +1 more source
Can we Beat the Square Root Bound for ECDLP over 𝔽p2 via Representation?
We give a 4-list algorithm for solving the Elliptic Curve Discrete Logarithm (ECDLP) over some quadratic field 𝔽p2. Using the representation technique, we reduce ECDLP to a multivariate polynomial zero testing problem.
Delaplace Claire, May Alexander
doaj +1 more source
ABSTRACT Background/Objectives Osteosarcoma is a radioresistant tumor that may benefit from stereotactic body radiation therapy (SBRT) for locoregional control in metastatic/recurrent disease. We report institutional practice patterns, outcomes, toxicity, and failures in osteosarcoma patients treated with SBRT.
Jenna Kocsis +13 more
wiley +1 more source
Scrutinising the secret state: parliamentary oversight of the intelligence and security agencies [PDF]
This article considers the growing parliamentary scrutiny of the intelligence and security agencies. It raises a number of questions about the role and effectiveness of the Intelligence and Security Committee, Parliament and ...
Bochel, Hugh +2 more
core +1 more source
Developmental Disorders in Children Recently Diagnosed With Cancer
ABSTRACT Neurocognitive deficits in adult survivors of childhood cancer are well established, but less is known about developmental disorders (DD) arising shortly after cancer diagnosis. Using 2016–2019 linked Ohio cancer registry and Medicaid data, we compared DD among 324 children with cancer and 606,913 cancer‐free controls.
Jamie Shoag +5 more
wiley +1 more source
Nonmalleable Information Flow: Technical Report
Noninterference is a popular semantic security condition because it offers strong end-to-end guarantees, it is inherently compositional, and it can be enforced using a simple security type system.
Arden, Owen +2 more
core +1 more source

