A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers
In this article, we provide the first independent security analysis of Deoxys, a third-round authenticated encryption candidate of the CAESAR competition, and its internal tweakable block ciphers Deoxys-BC-256 and Deoxys-BC-384.
Carlos Cid +4 more
doaj +1 more source
Fair and Square: Cake-Cutting in Two Dimensions
We consider the classic problem of fairly dividing a heterogeneous good ("cake") among several agents with different valuations. Classic cake-cutting procedures either allocate each agent a collection of disconnected pieces, or assume that the cake is a ...
Aumann, Yonatan +3 more
core +1 more source
Folds and Buckles at the Nanoscale: Experimental and Theoretical Investigation of the Bending Properties of Graphene Membranes [PDF]
The elastic properties of graphene crystals have been extensively investigated, revealing unique properties in the linear and nonlinear regimes, when the membranes are under either stretching or bending loading conditions. Nevertheless less knowledge has
CADELANO, EMILIANO +5 more
core +1 more source
Quarantine region scheme to mitigate spam attacks in wireless sensor networks [PDF]
The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink.
Cayirci, Erdal +5 more
core +1 more source
The ubiquitin ligase RNF115 is required for the clearance of damaged lysosomes
Upon lysosomal rupture, an E3 ubiquitin ligase RNF115 translocates from the cytosol to the damaged lysosomal membrane. Moreover, RNF115 depletion impairs the clearance of damaged lysosomes, identifying it as a key regulator of lysosomal quality control.
Sae Nakanaga +3 more
wiley +1 more source
Improved Search of Boomerang Distinguishers for Generalized Feistel and Application to WARP
Boomerang and rectangle cryptanalysis are powerful cryptanalytic techniques for security evaluation of block ciphers. Automated search for boomerang distinguishers is an important area of research. In FSE 2023, Hadipour et al.
Xinhao Zeng, Lin Tan, Hong Xu
doaj +1 more source
Exercises to determine the types of errors made in the solving of verbal problems in Algebra I. [PDF]
Thesis (Ed.M.)--Boston ...
Tenney, Arthur C.
core +1 more source
Somatic mutational landscape in von Hippel–Lindau familial hemangioblastoma
The causes of central nervous system (CNS) hemangioblastoma in Von Hippel–Lindau (vHL) disease are unclear. We used Whole Exome Sequencing (WES) on familial hemangioblastoma to investigate events that underlie tumor development. Our findings suggest that VHL loss creates a permissive environment for tumor formation, while additional alterations ...
Maja Dembic +5 more
wiley +1 more source
Cracking the Code: Genotype–Phenotype Correlation Models in Sarcoglycanopathies
ABSTRACT Objective Sarcoglycanopathies are among the most severe limb‐girdle muscular dystrophies (LGMD), though milder presentations have been described. These diseases are primarily caused by missense variants, but the limited predictability of their effect on protein maturation, complex formation, and transport has hindered reliable genotype ...
Leonela Luce +72 more
wiley +1 more source
A Genetic Algorithm Tool (splicer) for Complex Scheduling Problems and the Space Station Freedom Resupply Problem [PDF]
The Space Station Freedom will require the supply of items in a regular fashion. A schedule for the delivery of these items is not easy to design due to the large span of time involved and the possibility of cancellations and changes in shuttle flights ...
Valenzuela-Rendon, Manuel, Wang, Lui
core +1 more source

