Results 31 to 40 of about 2,456,516 (297)

Structured random measurements in signal processing [PDF]

open access: yes, 2014
Compressed sensing and its extensions have recently triggered interest in randomized signal acquisition. A key finding is that random measurements provide sparse signal reconstruction guarantees for efficient and stable algorithms with a minimal number ...
Krahmer, Felix, Rauhut, Holger
core   +1 more source

Multivariate Profiling of Hulls for Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology, 2018
Extensions of linear cryptanalysis making use of multiple approximations, such as multiple and multidimensional linear cryptanalysis, are an important tool in symmetric-key cryptanalysis, among others being responsible for the best known attacks on ...
Andrey Bogdanov   +2 more
doaj   +1 more source

Stigma resistance at the personal, peer, and public levels: A new conceptual model. [PDF]

open access: yes, 2017
Stigma resistance is consistently linked with key recovery outcomes, yet theoretical work is limited. This study explored stigma resistance from the perspective of individuals with serious mental illness (SMI).
Cornwell, Madison N.   +6 more
core   +1 more source

Key Recovery: Inert and Public [PDF]

open access: yes, 2017
We propose a public key infrastructure framework, inspired by modern distributed cryptocurrencies, that allows for tunable key escrow, where the availability of key escrow is only provided under strict conditions and enforced through cryptographic measures.
Boyd, Colin   +3 more
openaire   +3 more sources

Key Recovery for Content Protection Using Ternary PUFs Designed with Pre-Formed ReRAM

open access: yesApplied Sciences, 2022
Physical unclonable functions, embedded in terminal devices, can be used as part of the recovery process of session keys that protect digital files.
Bertrand Francis Cambou, Saloni Jain
doaj   +1 more source

A Key-Recovery Attack on SOBER-128 [PDF]

open access: yes, 2007
In this talk we consider linear approximations of layered cipher constructions with secret key-dependent constants that are inserted between layers, and where the layers have strong interdependency.
Hakala, Risto, Nyberg, Kaisa
core   +1 more source

Improved Attacks on LowMC with Algebraic Techniques

open access: yesIACR Transactions on Symmetric Cryptology, 2023
The LowMC family of SPN block cipher proposed by Albrecht et al. was designed specifically for MPC-/FHE-/ZKP-friendly use cases. It is especially used as the underlying block cipher of PICNIC, one of the alternate third-round candidate digital signature
Yimeng Sun, Jiamin Cui, Meiqin Wang
doaj   +1 more source

Effect of long-term starvation on the survival, recovery, and carbon utilization profiles of a bovine Escherichia coli O157:H7 isolate from New Zealand [PDF]

open access: yes, 2014
The ability to maintain a dual lifestyle of colonizing the ruminant gut and surviving in nonhost environments once shed is key to the success of Escherichia coli O157:H7 as a zoonotic pathogen.
McDonald, Ian R.   +3 more
core   +2 more sources

Fault Attacks on the Authenticated Encryption Stream Cipher MORUS

open access: yesCryptography, 2018
This paper investigates the application of fault attacks to the authenticated encryption stream cipher algorithm MORUS. We propose fault attacks on MORUS with two different goals: one to breach the confidentiality component, and the other to breach the ...
Iftekhar Salam   +4 more
doaj   +1 more source

Cube-Based Cryptanalysis of Subterranean-SAE

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Subterranean 2.0 designed by Daemen, Massolino and Rotella is a Round 2 candidate of the NIST Lightweight Cryptography Standardization process. In the official document of Subterranean 2.0, the designers have analyzed the state collisions in unkeyed ...
Fukang Liu, Takanori Isobe, Willi Meier
doaj   +1 more source

Home - About - Disclaimer - Privacy