Results 31 to 40 of about 1,221,489 (244)
Side Channel Analysis of SPECK Based on Transfer Learning
Although side-channel attacks based on deep learning are widely used in AES encryption algorithms, there is little research on lightweight algorithms. Lightweight algorithms have fewer nonlinear operations, so it is more difficult to attack successfully.
Qingqing Zhang +4 more
doaj +1 more source
Introduction Despite being more than two decades of research, mesenchymal stromal cell (MSC) treatments are still struggling to cross the translational gap.
Kelly D Cobey +4 more
doaj +1 more source
Quantum Image Encryption Using a Self-Adaptive Hash Function-Controlled Chaotic Map (SAHF-CCM)
Recently, quantum image encryption algorithms are attracting more and more attention, due to the upcoming quantum threat problem to the current cryptographic encryption algorithms with the rapid progress toward the quantum computer production. The aim of
Roayat Ismail Abdelfatah
doaj +1 more source
On the Voting Time of the Deterministic Majority Process [PDF]
In the deterministic binary majority process we are given a simple graph where each node has one out of two initial opinions. In every round, every node adopts the majority opinion among its neighbors.
Dominik Kaaser +4 more
core +5 more sources
Key elements for the education and counselling of patients treated with oral anticancer drugs
Purpose: The process of education and counselling of patients treated with oral anticancer drugs, aimed to achieve adequate self-management, involves different stakeholders (Le.
Coolbrandt, Annemarie +5 more
core +1 more source
The Deregulation of the Private Equity Markets and the Decline in IPOs [PDF]
The deregulation of securities laws—in particular the National Securities Markets Improvement Act (NSMIA) of 1996—has increased the supply of private capital to late-stage private startups, which are now able to grow to a size that few private firms used
Ewens, Michael, Farre-Mensa, Joan
core
The round goby (Neogobius melanostomus) is a very successful invasive fish species, which was unintentionally introduced to the central Baltic Sea (Gulf of Gdansk) in 1990.
Artūras Skabeikis, Artūras Skabeikis
doaj +1 more source
On Bioelectric Algorithms [PDF]
Cellular bioelectricity describes the biological phenomenon in which cells in living tissue generate and maintain patterns of voltage gradients across their membranes induced by differing concentrations of charged ions.
Gilbert, Seth +2 more
core +1 more source
Applying Grover's algorithm to AES: quantum resource estimates
We present quantum circuits to implement an exhaustive key search for the Advanced Encryption Standard (AES) and analyze the quantum resources required to carry out such an attack.
A Barenco +17 more
core +1 more source
3-subset meet-in-the-middle attack on block cipher TWIS
To do further analysis of the security of lightweight block cipher TWIS, 3-subset meet-in-the-middle attack was applied to 10-round TWIS without the final whitening.
Ya-fei ZHENG, Hong-ru WEI
doaj +2 more sources

