Results 21 to 30 of about 454,487 (179)
3-subset meet-in-the-middle attack on block cipher TWIS
To do further analysis of the security of lightweight block cipher TWIS, 3-subset meet-in-the-middle attack was applied to 10-round TWIS without the final whitening.
Ya-fei ZHENG, Hong-ru WEI
doaj +2 more sources
Improved Cryptanalysis of Reduced-Version QARMA-64/128
QARMA is a new tweakable block cipher used for memory encryption, the generation of short tags and the construction of the keyed hash functions in future.
Ya Liu +5 more
doaj +1 more source
Meeting in the middle: motivational interviewing and self-determination theory [PDF]
Motivational interviewing (MI) is indeed a "bottom-up" model that emerged from practical experience in the field of alcohol treatment. The original description of MI [1] suggested some links to social psychological theories, but focused on an intuitive approach in treating alcohol problems for which there was at the time no empirical support.
Miller William R, Rollnick Stephen
openaire +3 more sources
Meet-in-the-middle attacks on FOX block cipher
The security of the block cipher FOX against meet-in-the-middle attack was analyzed.Firstly,3-round meet-in-the-middle distinguishers was constructed and 6-round meet-in-the-middle attacks for FOX64 and FOX128 was proposed.The two attacks were beter ...
IRong-jia L, INChen-hui J
doaj +2 more sources
DNA methylation, colon cancer and Mediterranean diet: results from the EPIC-Italy cohort
The biological mechanisms through which adherence to Mediterranean Diet (MD) protects against colon cancer (CC) are poorly understood. Evidence suggests that chronic inflammation may be implicated in the pathway.
Francesca Fasanelli +16 more
doaj +1 more source
Improved Meet-in-the-Middle Attacks on Generic Feistel Constructions
In this paper, we present improved meet-in-the-middle key-recovery attacks on six-round and seven-round Feistel constructions separately. The attacks are based on Guo et al.'s work which appends one round to the five-round distinguisher to attack the six-
Shibin Zhao +4 more
doaj +1 more source
Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm
Kiasu-BC algorithm is an internal tweakable block cipher of authenticated encryption algorithm Kiasu as one of first-round candidates in the CAESAR competition.The precomputation complexity is reduced by utilizing the freedom of the tweak and the ...
Manman LI, Shaozhen CHEN
doaj +2 more sources
The parallel-cut meet-in-the-middle attack [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Nikolić, Ivica, Wang, Lei, Wu, Shuang
openaire +2 more sources
Isogeny-based post-quantum key exchange protocols [PDF]
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core
Grayscale Image Authentication using Neural Hashing
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication.
Kutlu, Yakup, Yayık, Apdullah
core +2 more sources

