Results 31 to 40 of about 2,456,516 (297)
Structured random measurements in signal processing [PDF]
Compressed sensing and its extensions have recently triggered interest in randomized signal acquisition. A key finding is that random measurements provide sparse signal reconstruction guarantees for efficient and stable algorithms with a minimal number ...
Krahmer, Felix, Rauhut, Holger
core +1 more source
Multivariate Profiling of Hulls for Linear Cryptanalysis
Extensions of linear cryptanalysis making use of multiple approximations, such as multiple and multidimensional linear cryptanalysis, are an important tool in symmetric-key cryptanalysis, among others being responsible for the best known attacks on ...
Andrey Bogdanov +2 more
doaj +1 more source
Stigma resistance at the personal, peer, and public levels: A new conceptual model. [PDF]
Stigma resistance is consistently linked with key recovery outcomes, yet theoretical work is limited. This study explored stigma resistance from the perspective of individuals with serious mental illness (SMI).
Cornwell, Madison N. +6 more
core +1 more source
Key Recovery: Inert and Public [PDF]
We propose a public key infrastructure framework, inspired by modern distributed cryptocurrencies, that allows for tunable key escrow, where the availability of key escrow is only provided under strict conditions and enforced through cryptographic measures.
Boyd, Colin +3 more
openaire +3 more sources
Key Recovery for Content Protection Using Ternary PUFs Designed with Pre-Formed ReRAM
Physical unclonable functions, embedded in terminal devices, can be used as part of the recovery process of session keys that protect digital files.
Bertrand Francis Cambou, Saloni Jain
doaj +1 more source
A Key-Recovery Attack on SOBER-128 [PDF]
In this talk we consider linear approximations of layered cipher constructions with secret key-dependent constants that are inserted between layers, and where the layers have strong interdependency.
Hakala, Risto, Nyberg, Kaisa
core +1 more source
Improved Attacks on LowMC with Algebraic Techniques
The LowMC family of SPN block cipher proposed by Albrecht et al. was designed specifically for MPC-/FHE-/ZKP-friendly use cases. It is especially used as the underlying block cipher of PICNIC, one of the alternate third-round candidate digital signature
Yimeng Sun, Jiamin Cui, Meiqin Wang
doaj +1 more source
Effect of long-term starvation on the survival, recovery, and carbon utilization profiles of a bovine Escherichia coli O157:H7 isolate from New Zealand [PDF]
The ability to maintain a dual lifestyle of colonizing the ruminant gut and surviving in nonhost environments once shed is key to the success of Escherichia coli O157:H7 as a zoonotic pathogen.
McDonald, Ian R. +3 more
core +2 more sources
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
This paper investigates the application of fault attacks to the authenticated encryption stream cipher algorithm MORUS. We propose fault attacks on MORUS with two different goals: one to breach the confidentiality component, and the other to breach the ...
Iftekhar Salam +4 more
doaj +1 more source
Cube-Based Cryptanalysis of Subterranean-SAE
Subterranean 2.0 designed by Daemen, Massolino and Rotella is a Round 2 candidate of the NIST Lightweight Cryptography Standardization process. In the official document of Subterranean 2.0, the designers have analyzed the state collisions in unkeyed ...
Fukang Liu, Takanori Isobe, Willi Meier
doaj +1 more source

