Results 31 to 40 of about 1,221,489 (244)

Side Channel Analysis of SPECK Based on Transfer Learning

open access: yesSensors, 2022
Although side-channel attacks based on deep learning are widely used in AES encryption algorithms, there is little research on lightweight algorithms. Lightweight algorithms have fewer nonlinear operations, so it is more difficult to attack successfully.
Qingqing Zhang   +4 more
doaj   +1 more source

Establishment of a consensus definition for mesenchymal stromal cells (MSC) and reporting guidelines for clinical trials of MSC therapy: a modified Delphi study protocol

open access: yesBMJ Open, 2021
Introduction Despite being more than two decades of research, mesenchymal stromal cell (MSC) treatments are still struggling to cross the translational gap.
Kelly D Cobey   +4 more
doaj   +1 more source

Quantum Image Encryption Using a Self-Adaptive Hash Function-Controlled Chaotic Map (SAHF-CCM)

open access: yesIEEE Access, 2022
Recently, quantum image encryption algorithms are attracting more and more attention, due to the upcoming quantum threat problem to the current cryptographic encryption algorithms with the rapid progress toward the quantum computer production. The aim of
Roayat Ismail Abdelfatah
doaj   +1 more source

On the Voting Time of the Deterministic Majority Process [PDF]

open access: yes, 2015
In the deterministic binary majority process we are given a simple graph where each node has one out of two initial opinions. In every round, every node adopts the majority opinion among its neighbors.
Dominik Kaaser   +4 more
core   +5 more sources

Key elements for the education and counselling of patients treated with oral anticancer drugs

open access: yes, 2019
Purpose: The process of education and counselling of patients treated with oral anticancer drugs, aimed to achieve adequate self-management, involves different stakeholders (Le.
Coolbrandt, Annemarie   +5 more
core   +1 more source

The Deregulation of the Private Equity Markets and the Decline in IPOs [PDF]

open access: yes, 2020
The deregulation of securities laws—in particular the National Securities Markets Improvement Act (NSMIA) of 1996—has increased the supply of private capital to late-stage private startups, which are now able to grow to a size that few private firms used
Ewens, Michael, Farre-Mensa, Joan
core  

Feeding activity and diet composition of round goby (Neogobius melanostomus) in the coastal waters of SE Baltic Sea

open access: yesFrontiers in Marine Science, 2015
The round goby (Neogobius melanostomus) is a very successful invasive fish species, which was unintentionally introduced to the central Baltic Sea (Gulf of Gdansk) in 1990.
Artūras Skabeikis, Artūras Skabeikis
doaj   +1 more source

On Bioelectric Algorithms [PDF]

open access: yes, 2019
Cellular bioelectricity describes the biological phenomenon in which cells in living tissue generate and maintain patterns of voltage gradients across their membranes induced by differing concentrations of charged ions.
Gilbert, Seth   +2 more
core   +1 more source

Applying Grover's algorithm to AES: quantum resource estimates

open access: yes, 2015
We present quantum circuits to implement an exhaustive key search for the Advanced Encryption Standard (AES) and analyze the quantum resources required to carry out such an attack.
A Barenco   +17 more
core   +1 more source

3-subset meet-in-the-middle attack on block cipher TWIS

open access: yesTongxin xuebao, 2014
To do further analysis of the security of lightweight block cipher TWIS, 3-subset meet-in-the-middle attack was applied to 10-round TWIS without the final whitening.
Ya-fei ZHENG, Hong-ru WEI
doaj   +2 more sources

Home - About - Disclaimer - Privacy