Results 51 to 60 of about 518,524 (183)

Un-Veiling Women’s Rights in the ‘War on Terrorism’ [PDF]

open access: yes, 2002
This thesis consists of an introductory chapter and four self-contained papers on temporary work agenciesand the economic analysis of law. Paper [I] adds to the theoretical literature on the incentives of Temporary Work Agencies (TWAs).
Kapur, Ratna
core   +2 more sources

Impossible Differential Cryptanalysis of SIMECK32/64 Algorithm [PDF]

open access: yesJisuanji gongcheng, 2017
This paper studies the capability of impossible differential cryptanalysis on block cipher SIMECK32/64.The 11-round impossible differential path of SIMECK32/64 is constructed using the meet-in-the-middle technology.The attack on 19-round SIMECK32/64 is ...
CHEN Yanqin,ZHANG Wenying
doaj   +1 more source

Taking Back the Workers’ Law: How to Fight the Assault on Labor Rights [PDF]

open access: yes, 2006
[Excerpt] This book focuses on unions and on the National Labor Relations Board (NLRB) and National Labor Relations Act (NLRA) – the agency and the law created to promote unionization and collective bargaining. This is not a story of mourning.
Dannin, Ellen
core   +1 more source

A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE

open access: yesIEEE Access, 2019
The dual attack is one of the most efficient attack algorithms for learning with errors (LWE) problem. Recently, an efficient variant of the dual attack for sparse and small secret LWE was reported by Albrecht (Eurocrypt 2017), which forces some LWE ...
Jung Hee Cheon   +3 more
doaj   +1 more source

Cracks in the Foundation: NATO's New Troubles [PDF]

open access: yes, 2008
The North Atlantic Treaty Organization is beginning to fracture. Its members, sharing the triumphalism that underpinned U.S. foreign policy after the Cold War, took on burdens that have proved more difficult than expected.
Stanley Kober
core  

The Pen and the Sword: Legal Justifications for the United States’ Engagement Against the Islamic State of Iraq and Syria (ISIS) [PDF]

open access: yes, 2015
Part I of this Comment will lay out the potential arguments the United States could make to justify its engagement against ISIS under international law, jus ad bellum. This Part will also present existing commentary on the strengths and weaknesses of the
Gonzalez, Olivia
core   +1 more source

A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack

open access: yesJournal of Mathematical Cryptology, 2019
Over the past decade, the hybrid lattice-reduction and meet-in-the middle attack (called hybrid attack) has been used to evaluate the security of many lattice-based cryptographic schemes such as NTRU, NTRU Prime, BLISS and more.
Wunderer Thomas
doaj   +1 more source

Improved Meet-in-the-Middle Attacks on Reduced-Round DES [PDF]

open access: yes, 2007
The Data Encryption Standard (DES) is a 64-bit block cipher. Despite its short key size of 56 bits, DES continues to be used to protect financial transactions valued at billions of Euros. In this paper, we investigate the strength of DES against attacks that use a limited number of plaintexts and ciphertexts.
Dunkelman, Orr   +2 more
openaire   +2 more sources

Improved preimage and pseudo-collision attacks on SM3 hash function

open access: yesTongxin xuebao, 2018
A preimage attack on 32-step SM3 hash function and a pseudo-collision attack on 33-step SM3 hash function respectively were shown.32-step preimage attack was based on the differential meet-in-the-middle and biclique technique,while the previously known ...
Jian ZOU, Le DONG
doaj   +2 more sources

A Known-Plaintext Attack with Minimal Data Complexity on 25-Round CRAFT

open access: yesIACR Transactions on Symmetric Cryptology
We present the first known-plaintext attack on up to 25 rounds of the tweakable block cipher Craft. These attacks require only two known plaintextciphertext pairs to recover the full key, and work independent of the used tweaks.
Eran Lambooij, Patrick Neumann
doaj   +1 more source

Home - About - Disclaimer - Privacy