Results 81 to 90 of about 389,362 (239)
Observations on the BayesianKeySearch with Applications to Simon and Simeck
In CRYPTO 2019, Gohr pioneered the integration of machine learning with differential cryptanalysis, demonstrating that differential-neural distinguishers can outperform classical techniques in distinguishing attacks.
Zezhou Hou +3 more
doaj +1 more source
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
This paper investigates the application of fault attacks to the authenticated encryption stream cipher algorithm MORUS. We propose fault attacks on MORUS with two different goals: one to breach the confidentiality component, and the other to breach the ...
Iftekhar Salam +4 more
doaj +1 more source
ABSTRACT Objective To delineate specific in vivo white matter pathology in neuronal intranuclear inclusion disease (NIID) using diffusion spectrum imaging (DSI) and define its clinical relevance. Methods DSI was performed on 42 NIID patients and 38 matched controls.
Kaiyan Jiang +10 more
wiley +1 more source
Quantum Chosen-Cipher Attack on Camellia
The Feistel structure represents a fundamental architectural component within the domain of symmetric cryptographic algorithms, with a substantial body of research conducted within the context of classical computing environments.
Yanjun Li +4 more
doaj +1 more source
The principle of compressed sensing (CS) can be applied in a cryptosystem by providing the notion of security. In this paper, we study the computational security of a CS-based cryptosystem that encrypts a plaintext with a partial unitary sensing matrix ...
Nam Yul Yu
doaj +1 more source
Measuring the effects of the September 11 attack on New York City [PDF]
The attack on the World Trade Center had an enormous financial, as well as emotional, impact on New York City. This article measures the short-term economic effects on the city's labor force and capital stock through June 2002, the end of the recovery ...
Carol Rapaport, James Orr, Jason Bram
core +1 more source
Impact of Asymptomatic Intracranial Hemorrhage on Outcome After Endovascular Stroke Treatment
ABSTRACT Background Endovascular treatment (EVT) achieves high rates of recanalization in acute large‐vessel occlusion (LVO) stroke, but functional recovery remains heterogeneous. While symptomatic intracranial hemorrhage (sICH) has been well studied, the prognostic impact of asymptomatic intracranial hemorrhage (aICH) after EVT is less certain ...
Shihai Yang +22 more
wiley +1 more source
Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation
Classic McEliece is one of the three code-based candidates in the fourth round of the NIST post-quantum cryptography standardization process in the Key Encapsulation Mechanism category. As such, its decapsulation algorithm is used to recover the session
Vlad-Florin Drăgoi +4 more
doaj +1 more source
Multivariate Profiling of Hulls for Linear Cryptanalysis
Extensions of linear cryptanalysis making use of multiple approximations, such as multiple and multidimensional linear cryptanalysis, are an important tool in symmetric-key cryptanalysis, among others being responsible for the best known attacks on ...
Andrey Bogdanov +2 more
doaj +1 more source
ABSTRACT Background Accessing brain magnetic resonance imaging (MRI) can be challenging, especially for underserved patients, which may lead to disparities in neurological diagnosis. Method This mixed‐methods study enrolled adults with one of four neurological disorders: mild cognitive impairment or dementia of the Alzheimer type, multiple sclerosis ...
Maya L. Mastick +19 more
wiley +1 more source

