Results 71 to 80 of about 518,524 (183)

By a Thread: The New Experience of America's Middle Class [PDF]

open access: yes, 2007
Developed in collaboration with the Institute on Assets and Social Policy at Brandeis University, By a Thread: The New Experience of America's Middle Class looks at the financial security of the middle class using the innovative Middle Class Security ...
Jennifer Wheary   +2 more
core  

Unbalanced Biclique Cryptanalysis of Full-Round GIFT

open access: yesIEEE Access, 2019
GIFT is a family of lightweight block ciphers presented at CHES 2017. Biclique cryptanalysis is proposed to attack the full AES by Bogdanov et al. in ASIACRYPT 2011.
Guoyong Han   +2 more
doaj   +1 more source

Spartan Daily, December 5, 1961 [PDF]

open access: yes, 1961
Volume 49, Issue 45https://scholarworks.sjsu.edu/spartandaily/4232/thumbnail ...
San Jose State University, School of Journalism and Mass Communications
core   +1 more source

Seeking comradeship in the "Ogre's Den:" Winston Churchill's quest for a warrior alliance and his mission to Stalin, August 1942 [PDF]

open access: yes, 2007
On 12 August 1942, British Prime Minister Winston Churchill arrived in Moscow to meet Soviet leader Josef Stalin, for the first time, a mission that Churchill’s wife, Clementine, had described to him as a “visit to the Ogre in his Den.” Churchill had, by
Folly, MH
core  

Session Initiation Protocol Attacks and Challenges

open access: yes, 2012
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP).
Keshavarz, Hassan   +2 more
core  

Meet-in-the-Middle Attacks on AES

open access: yes, 2013
Cette thèse est dédiée à la cryptanalyse de l'AES (Advanced Encryption Standard) qui est l'un des systèmes de chiffrement par bloc les plus répandu dans le monde. Nous y présentons une nouvelle technique pour résoudre un type particulier d'équations spécialement conçu pour attaquer l'AES.
openaire   +1 more source

On the Complexity of Implementation Some Cryptanalysis Methods by Distributed Computing

open access: yesБезопасность информационных технологий, 2011
The subject of the research is an investigation on the distributed computing efficiency in the analysis of cryptographic systems by different key search methods: meet-in-the-middle, sequential key search and Hellman method.
A. A. Varfolomeev   +3 more
doaj  

Cryptanalysis of Full-Round BipBip

open access: yesIACR Transactions on Symmetric Cryptology
BipBip is a low-latency tweakable block cipher proposed by Belkheyar et al. in 2023. It was designed for pointer encryption inside a new memory safety mechanism called Cryptographic Capability Computing (C3). BipBip encrypts blocks of 24 bits using a 40-
Jinliang Wang   +5 more
doaj   +1 more source

About Method “Meet in Middle of Attack” for Cryptanalysis of Block Ciphers by means of Distributed Computations

open access: yesБезопасность информационных технологий, 2011
Distributed computations are considered as a tool of cryptanalysis. It is shown that time of implementation of “meet in the middle of attack” method using distributed computations designed for cryptanalysis of some class of iterative symmetric block ...
V. M. Fomichev
doaj  

Cryptanalysis of QARMAv2

open access: yesIACR Transactions on Symmetric Cryptology
QARMAv2 is a general-purpose and hardware-oriented family of lightweight tweakable block ciphers (TBCs) introduced in ToSC 2023. QARMAv2, as a redesign of QARMAv1 with a longer tweak and tighter security margins, is also designed to be suitable for ...
Hosein Hadipour, Yosuke Todo
doaj   +1 more source

Home - About - Disclaimer - Privacy