Results 41 to 50 of about 1,018 (121)

Alphabet Letter Recognition And Emergent Literacy Abilities Of Rising Kindergarten Children Living In Low-Income Families [PDF]

open access: yes, 2003
Alphabet letter recognition item responses from 1,299 rising kindergarten children from low-income families were used to determine the dimensionality of letter recognition ability.
Wehry, Stephanie
core   +2 more sources

Fourier PCA and Robust Tensor Decomposition [PDF]

open access: yes, 2014
Fourier PCA is Principal Component Analysis of a matrix obtained from higher order derivatives of the logarithm of the Fourier transform of a distribution.We make this method algorithmic by developing a tensor decomposition method for a pair of tensors ...
Anandkumar A.   +11 more
core   +1 more source

Non Abelian Bent Functions

open access: yes, 2011
International audiencePerfect nonlinear functions from a finite group $G$ to another one $H$ are those functions $f: G \rightarrow H$ such that for all nonzero $\alpha \in G$, the derivative $d_{\alpha}f: x \mapsto f(\alpha x) f(x)^{-1}$ is balanced.
Poinsot, Laurent
core   +3 more sources

Analysis of Diffusion Properties in Generalized Feistel Ciphers Under Multidimensional Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology
This paper presents a unified framework for generic attacks on Generalized Feistel Ciphers, with a primary focus on Type 1, Type 2, and unbalanced contracting (U-Type 1) Feistel constructions with non-invertible round functions.
Betül Aşkın Özdemir, Vincent Rijmen
doaj   +1 more source

Quantum‐Enhanced Zero‐Knowledge Compression Used for Cloud IoT Healthcare: A Scalable, Privacy‐Preserving QZ‐HCN Framework

open access: yesInternational Journal of Intelligent Systems, Volume 2026, Issue 1, 2026.
The Internet of Medical Things (IoMT) in the IoT with Cloud Healthcare (CHI) creates a high volume of real‐time medical data, but traditional compression methods suffer high computation costs, privacy leaks and quantum attacks, while advanced cryptographic algorithms such as homomorphic encryption are costly and have poor scalability for the real‐time ...
Rajasekaran P.   +5 more
wiley   +1 more source

Cybersecurity and Artificial Intelligence in Unmanned Aerial Vehicles: Emerging Challenges and Advanced Countermeasures

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The increasing adoption of artificial intelligence (AI)‐driven unmanned aerial vehicles (UAVs) in military, commercial, and surveillance operations has introduced significant security challenges, including cyber threats, adversarial AI attacks, and communication vulnerabilities. This paper presents a comprehensive review of the key security threats and
Deafallah Alsadie, Jiwei Tian
wiley   +1 more source

An Exploration of the Kolmogorov-Smirnov Test as a Competitor to Mutual Information Analysis [PDF]

open access: yes, 2011
A theme of recent side-channel research has been the quest for distinguishers which remain effective even when few assumptions can be made about the underlying distribution of the measured leakage traces.
Mather, Luke T   +2 more
core   +2 more sources

Chaotic Image Encryption Scheme Based on Improved Z‐Order Curve, Modified Josephus Problem, and RNA Operations: An Experimental Li‐Fi Approach

open access: yesComplexity, Volume 2024, Issue 1, 2024.
Image encryption schemes are predominantly software‐based. Only a select few have been implemented in real‐life communication systems. This paper introduces a novel chaotic image encryption scheme based on a modified Z‐order curve, a modified Josephus problem, and an improved Vigenère cipher–based ribonucleic acid (RNA) operation. It is implemented and
S. B. Nono Fotso   +5 more
wiley   +1 more source

On model reduction for quantum dynamics: symmetries and invariant subspaces

open access: yes, 2014
Simulation of quantum dynamics is a grand challenge of computational physics. In this work we investigate methods for reducing the demands of such simulation by identifying reduced-order models for dynamics generated by parameterized quantum Hamiltonians.
Kumar, Akshat, Sarovar, Mohan
core   +1 more source

Polly Cracker, revisited [PDF]

open access: yes, 2016
We formally treat cryptographic constructions based on the hardness of deciding ideal membership in multivariate polynomial rings. Of particular interest to us is a class of schemes known as “Polly Cracker.” We start by formalising and studying the ...
Albrecht, Martin   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy