Un-Veiling Women’s Rights in the ‘War on Terrorism’ [PDF]
This thesis consists of an introductory chapter and four self-contained papers on temporary work agenciesand the economic analysis of law. Paper [I] adds to the theoretical literature on the incentives of Temporary Work Agencies (TWAs).
Kapur, Ratna
core +2 more sources
Impossible Differential Cryptanalysis of SIMECK32/64 Algorithm [PDF]
This paper studies the capability of impossible differential cryptanalysis on block cipher SIMECK32/64.The 11-round impossible differential path of SIMECK32/64 is constructed using the meet-in-the-middle technology.The attack on 19-round SIMECK32/64 is ...
CHEN Yanqin,ZHANG Wenying
doaj +1 more source
Taking Back the Workers’ Law: How to Fight the Assault on Labor Rights [PDF]
[Excerpt] This book focuses on unions and on the National Labor Relations Board (NLRB) and National Labor Relations Act (NLRA) – the agency and the law created to promote unionization and collective bargaining. This is not a story of mourning.
Dannin, Ellen
core +1 more source
A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE
The dual attack is one of the most efficient attack algorithms for learning with errors (LWE) problem. Recently, an efficient variant of the dual attack for sparse and small secret LWE was reported by Albrecht (Eurocrypt 2017), which forces some LWE ...
Jung Hee Cheon +3 more
doaj +1 more source
Cracks in the Foundation: NATO's New Troubles [PDF]
The North Atlantic Treaty Organization is beginning to fracture. Its members, sharing the triumphalism that underpinned U.S. foreign policy after the Cold War, took on burdens that have proved more difficult than expected.
Stanley Kober
core
The Pen and the Sword: Legal Justifications for the United States’ Engagement Against the Islamic State of Iraq and Syria (ISIS) [PDF]
Part I of this Comment will lay out the potential arguments the United States could make to justify its engagement against ISIS under international law, jus ad bellum. This Part will also present existing commentary on the strengths and weaknesses of the
Gonzalez, Olivia
core +1 more source
A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack
Over the past decade, the hybrid lattice-reduction and meet-in-the middle attack (called hybrid attack) has been used to evaluate the security of many lattice-based cryptographic schemes such as NTRU, NTRU Prime, BLISS and more.
Wunderer Thomas
doaj +1 more source
Improved Meet-in-the-Middle Attacks on Reduced-Round DES [PDF]
The Data Encryption Standard (DES) is a 64-bit block cipher. Despite its short key size of 56 bits, DES continues to be used to protect financial transactions valued at billions of Euros. In this paper, we investigate the strength of DES against attacks that use a limited number of plaintexts and ciphertexts.
Dunkelman, Orr +2 more
openaire +2 more sources
Improved preimage and pseudo-collision attacks on SM3 hash function
A preimage attack on 32-step SM3 hash function and a pseudo-collision attack on 33-step SM3 hash function respectively were shown.32-step preimage attack was based on the differential meet-in-the-middle and biclique technique,while the previously known ...
Jian ZOU, Le DONG
doaj +2 more sources
A Known-Plaintext Attack with Minimal Data Complexity on 25-Round CRAFT
We present the first known-plaintext attack on up to 25 rounds of the tweakable block cipher Craft. These attacks require only two known plaintextciphertext pairs to recover the full key, and work independent of the used tweaks.
Eran Lambooij, Patrick Neumann
doaj +1 more source

