Results 21 to 30 of about 454,487 (179)

3-subset meet-in-the-middle attack on block cipher TWIS

open access: yesTongxin xuebao, 2014
To do further analysis of the security of lightweight block cipher TWIS, 3-subset meet-in-the-middle attack was applied to 10-round TWIS without the final whitening.
Ya-fei ZHENG, Hong-ru WEI
doaj   +2 more sources

Improved Cryptanalysis of Reduced-Version QARMA-64/128

open access: yesIEEE Access, 2020
QARMA is a new tweakable block cipher used for memory encryption, the generation of short tags and the construction of the keyed hash functions in future.
Ya Liu   +5 more
doaj   +1 more source

Meeting in the middle: motivational interviewing and self-determination theory [PDF]

open access: yesInternational Journal of Behavioral Nutrition and Physical Activity, 2012
Motivational interviewing (MI) is indeed a "bottom-up" model that emerged from practical experience in the field of alcohol treatment. The original description of MI [1] suggested some links to social psychological theories, but focused on an intuitive approach in treating alcohol problems for which there was at the time no empirical support.
Miller William R, Rollnick Stephen
openaire   +3 more sources

Meet-in-the-middle attacks on FOX block cipher

open access: yesTongxin xuebao, 2016
The security of the block cipher FOX against meet-in-the-middle attack was analyzed.Firstly,3-round meet-in-the-middle distinguishers was constructed and 6-round meet-in-the-middle attacks for FOX64 and FOX128 was proposed.The two attacks were beter ...
IRong-jia L, INChen-hui J
doaj   +2 more sources

DNA methylation, colon cancer and Mediterranean diet: results from the EPIC-Italy cohort

open access: yesEpigenetics, 2019
The biological mechanisms through which adherence to Mediterranean Diet (MD) protects against colon cancer (CC) are poorly understood. Evidence suggests that chronic inflammation may be implicated in the pathway.
Francesca Fasanelli   +16 more
doaj   +1 more source

Improved Meet-in-the-Middle Attacks on Generic Feistel Constructions

open access: yesIEEE Access, 2019
In this paper, we present improved meet-in-the-middle key-recovery attacks on six-round and seven-round Feistel constructions separately. The attacks are based on Guo et al.'s work which appends one round to the five-round distinguisher to attack the six-
Shibin Zhao   +4 more
doaj   +1 more source

Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm

open access: yesTongxin xuebao, 2022
Kiasu-BC algorithm is an internal tweakable block cipher of authenticated encryption algorithm Kiasu as one of first-round candidates in the CAESAR competition.The precomputation complexity is reduced by utilizing the freedom of the tweak and the ...
Manman LI, Shaozhen CHEN
doaj   +2 more sources

The parallel-cut meet-in-the-middle attack [PDF]

open access: yesCryptography and Communications, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Nikolić, Ivica, Wang, Lei, Wu, Shuang
openaire   +2 more sources

Isogeny-based post-quantum key exchange protocols [PDF]

open access: yes, 2020
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core  

Grayscale Image Authentication using Neural Hashing

open access: yes, 2016
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication.
Kutlu, Yakup, Yayık, Apdullah
core   +2 more sources

Home - About - Disclaimer - Privacy