Results 41 to 50 of about 10,030,622 (339)
SUMMARY In this short note, we formally show that Keyed-Homomorphic Public Key Encryption (KH-PKE) is secure against key recovery attacks and ciphertext validity attacks that have been introduced as chosen-ciphertext attacks for homomorphic encryption.
K. Emura
semanticscholar +1 more source
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
This paper investigates the application of fault attacks to the authenticated encryption stream cipher algorithm MORUS. We propose fault attacks on MORUS with two different goals: one to breach the confidentiality component, and the other to breach the ...
Iftekhar Salam +4 more
doaj +1 more source
Computational neurorehabilitation: modeling plasticity and learning to predict recovery [PDF]
Despite progress in using computational approaches to inform medicine and neuroscience in the last 30 years, there have been few attempts to model the mechanisms underlying sensorimotor rehabilitation.
Burdet, E +8 more
core +5 more sources
Cube-Based Cryptanalysis of Subterranean-SAE
Subterranean 2.0 designed by Daemen, Massolino and Rotella is a Round 2 candidate of the NIST Lightweight Cryptography Standardization process. In the official document of Subterranean 2.0, the designers have analyzed the state collisions in unkeyed ...
Fukang Liu, Takanori Isobe, Willi Meier
doaj +1 more source
A Durable Magnetic Superhydrophobic Melamine Sponge: For Solving Complex Marine Oil Spills
The problem of offshore oil leakage has wreaked havoc on the environment and people’s health. A simple and environmentally friendly impregnation method combined with marine mussel bionics was used to address this issue.
Hanmo Si +5 more
doaj +1 more source
A Key-Recovery Attack on SOBER-128 [PDF]
In this talk we consider linear approximations of layered cipher constructions with secret key-dependent constants that are inserted between layers, and where the layers have strong interdependency.
Hakala, Risto, Nyberg, Kaisa
core +1 more source
Quantum key recovery attack on SIMON32/64
The quantum security of lightweight block ciphers is receiving more and more attention. However, the existing quantum attacks on lightweight block ciphers only focused on the quantum exhaustive search, while the quantum attacks combined with classical ...
Hui Liu, Li Yang
semanticscholar +1 more source
Stigma resistance at the personal, peer, and public levels: A new conceptual model. [PDF]
Stigma resistance is consistently linked with key recovery outcomes, yet theoretical work is limited. This study explored stigma resistance from the perspective of individuals with serious mental illness (SMI).
Cornwell, Madison N. +6 more
core +1 more source
This research article assesses the feasibility of cold boot attacks on the lifted unbalanced oil and Vinegar (LUOV) scheme, a variant of the UOV signature scheme.
Ricardo Villanueva-Polanco
doaj +1 more source
The end of the waterfall: Default resources of central counterparties [PDF]
Central counterparties (CCPs) have become pillars of the new global financial architecture following the financial crisis of 2008. The key role of CCPs in mitigating counterparty risk and contagion has in turn cast them as systemically important ...
Cont, R
core +3 more sources

