Results 21 to 30 of about 34,576 (259)

On Boomerang Attacks on Quadratic Feistel Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2023
The recent introduction of the Boomerang Connectivity Table (BCT) at Eurocrypt 2018 revived interest in boomerang cryptanalysis and in the need to correctly build boomerang distinguishers.
Xavier Bonnetain, Virginie Lallemand
doaj   +1 more source

Exploring Differential-Based Distinguishers and Forgeries for ASCON

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Automated methods have become crucial components when searching for distinguishers against symmetric-key cryptographic primitives. While MILP and SAT solvers are among the most popular tools to model ciphers and perform cryptanalysis, other methods with ...
David Gerault   +2 more
doaj   +1 more source

Computer-aided Melody Note Transcription Using the Tony Software: Accuracy and Efficiency [PDF]

open access: yes, 2015
accepteddate-added: 2015-05-24 19:18:46 +0000 date-modified: 2017-12-28 10:36:36 +0000 keywords: Tony, melody, note, transcription, open source software bdsk-url-1: https://code.soundsoftware.ac.uk/attachments/download/1423/tony-paper_preprint.pdfdate ...
Bello, J   +7 more
core   +1 more source

Security Analysis of SKINNY under Related-Tweakey Settings

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In CRYPTO’16, a new family of tweakable lightweight block ciphers - SKINNY was introduced. Denoting the variants of SKINNY as SKINNY-n-t, where n represents the block size and t represents the tweakey length, the design specifies t ∈ {n, 2n, 3n}. In this
Guozhen Liu, Mohona Ghosh, Ling Song
doaj   +1 more source

Improvement of the robustness on geographical networks by adding shortcuts [PDF]

open access: yes, 2006
In a topological structure affected by geographical constraints on liking, the connectivity is weakened by constructing local stubs with small cycles, a something of randomness to bridge them is crucial for the robust network design.
Albert   +29 more
core   +3 more sources

Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack [PDF]

open access: yes, 2016
The single-shot collision attack on RSA proposed by Hanley et al. is studied focusing on the difference between two operands of multiplier. It is shown that how leakage from integer multiplier and long-integer multiplication algorithm can be asymmetric ...
Daisuke SUZUKI   +2 more
core   +2 more sources

Underwater detection of dangerous substances: status the SABAT project [PDF]

open access: yes, 2017
The Neutron Activation Analysis (NAA) plays an exceptional role in the modern nuclear engineering, especially in detection of hazardous substances. However, in the aquatic environment, there are still many problems to be solved for effective usage of ...
Moskal, P.   +5 more
core   +2 more sources

Numerical study of heat transfer enhancement by rectangular winglet vortex generator pair in a channel

open access: yesAdvances in Mechanical Engineering, 2016
A numerical simulation was performed to investigate the effects of longitudinal vortices on the heat transfer enhancement of a laminar flow in a rectangle duct mounted with rectangular winglet pair on the bottom wall.
Qiang Zhang, Liang-Bi Wang
doaj   +1 more source

IC-integrated flexible shear-stress sensor skin [PDF]

open access: yes, 2003
This paper reports the successful development of the first IC-integrated flexible MEMS shear-stress sensor skin. The sensor skin is 1 cm wide, 2 cm long, and 70 /spl mu/m thick. It contains 16 shear-stress sensors, which are arranged in a 1-D array, with
Ho, Chih-Ming   +3 more
core   +1 more source

Analysis of added mass in cavitating flow [PDF]

open access: yes, 2012
The paper addresses a theoretical study of the added mass effect in cavitating flow.The cavitation is considered to induce a strong time–space variation of the fluid density at the interface between an inviscid fluid and a three-degree-of-freedom rigid ...
ASTOLFI, Jacques Andre   +1 more
core   +6 more sources

Home - About - Disclaimer - Privacy