Results 21 to 30 of about 34,576 (259)
On Boomerang Attacks on Quadratic Feistel Ciphers
The recent introduction of the Boomerang Connectivity Table (BCT) at Eurocrypt 2018 revived interest in boomerang cryptanalysis and in the need to correctly build boomerang distinguishers.
Xavier Bonnetain, Virginie Lallemand
doaj +1 more source
Exploring Differential-Based Distinguishers and Forgeries for ASCON
Automated methods have become crucial components when searching for distinguishers against symmetric-key cryptographic primitives. While MILP and SAT solvers are among the most popular tools to model ciphers and perform cryptanalysis, other methods with ...
David Gerault +2 more
doaj +1 more source
Computer-aided Melody Note Transcription Using the Tony Software: Accuracy and Efficiency [PDF]
accepteddate-added: 2015-05-24 19:18:46 +0000 date-modified: 2017-12-28 10:36:36 +0000 keywords: Tony, melody, note, transcription, open source software bdsk-url-1: https://code.soundsoftware.ac.uk/attachments/download/1423/tony-paper_preprint.pdfdate ...
Bello, J +7 more
core +1 more source
Security Analysis of SKINNY under Related-Tweakey Settings
In CRYPTO’16, a new family of tweakable lightweight block ciphers - SKINNY was introduced. Denoting the variants of SKINNY as SKINNY-n-t, where n represents the block size and t represents the tweakey length, the design specifies t ∈ {n, 2n, 3n}. In this
Guozhen Liu, Mohona Ghosh, Ling Song
doaj +1 more source
Improvement of the robustness on geographical networks by adding shortcuts [PDF]
In a topological structure affected by geographical constraints on liking, the connectivity is weakened by constructing local stubs with small cycles, a something of randomness to bridge them is crucial for the robust network design.
Albert +29 more
core +3 more sources
Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack [PDF]
The single-shot collision attack on RSA proposed by Hanley et al. is studied focusing on the difference between two operands of multiplier. It is shown that how leakage from integer multiplier and long-integer multiplication algorithm can be asymmetric ...
Daisuke SUZUKI +2 more
core +2 more sources
Underwater detection of dangerous substances: status the SABAT project [PDF]
The Neutron Activation Analysis (NAA) plays an exceptional role in the modern nuclear engineering, especially in detection of hazardous substances. However, in the aquatic environment, there are still many problems to be solved for effective usage of ...
Moskal, P. +5 more
core +2 more sources
A numerical simulation was performed to investigate the effects of longitudinal vortices on the heat transfer enhancement of a laminar flow in a rectangle duct mounted with rectangular winglet pair on the bottom wall.
Qiang Zhang, Liang-Bi Wang
doaj +1 more source
IC-integrated flexible shear-stress sensor skin [PDF]
This paper reports the successful development of the first IC-integrated flexible MEMS shear-stress sensor skin. The sensor skin is 1 cm wide, 2 cm long, and 70 /spl mu/m thick. It contains 16 shear-stress sensors, which are arranged in a 1-D array, with
Ho, Chih-Ming +3 more
core +1 more source
Analysis of added mass in cavitating flow [PDF]
The paper addresses a theoretical study of the added mass effect in cavitating flow.The cavitation is considered to induce a strong time–space variation of the fluid density at the interface between an inviscid fluid and a three-degree-of-freedom rigid ...
ASTOLFI, Jacques Andre +1 more
core +6 more sources

