Results 21 to 30 of about 68,896 (312)

Security Analysis of SKINNY under Related-Tweakey Settings

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In CRYPTO’16, a new family of tweakable lightweight block ciphers - SKINNY was introduced. Denoting the variants of SKINNY as SKINNY-n-t, where n represents the block size and t represents the tweakey length, the design specifies t ∈ {n, 2n, 3n}. In this
Guozhen Liu, Mohona Ghosh, Ling Song
doaj   +1 more source

Taming graphs with no large creatures and skinny ladders [PDF]

open access: yesEmbedded Systems and Applications, 2022
We confirm a conjecture of Gartland and Lokshtanov [arXiv:2007.08761]: if for a hereditary graph class $\mathcal{G}$ there exists a constant $k$ such that no member of $\mathcal{G}$ contains a $k$-creature as an induced subgraph or a $k$-skinny-ladder as
Jakub Gajarsk'y   +6 more
semanticscholar   +1 more source

Cryptanalysis of Reduced round SKINNY Block Cipher

open access: yesIACR Transactions on Symmetric Cryptology, 2018
SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest hardware footprint. In this paper, we present zero-correlation linear approximations and the related-tweakey impossible differential characteristics for different ...
Sadegh Sadeghi   +2 more
doaj   +1 more source

Related-Key Impossible-Differential Attack on Reduced-Round Skinny [PDF]

open access: yes, 2017
At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with the NSA designs SIMON and SPECK.
Ankele, Ralph   +6 more
core   +2 more sources

Coupled skinny baker's maps and the Kaplan-Yorke conjecture [PDF]

open access: yes, 2013
The Kaplan-Yorke conjecture states that for "typical" dynamical systems with a physical measure, the information dimension and the Lyapunov dimension coincide.
Gröger, Maik, Hunt, Brian R.
core   +1 more source

Efficient MILP Modelings for Sboxes and Linear Layers of SPN ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Mixed Integer Linear Programming (MILP) solvers are regularly used by designers for providing security arguments and by cryptanalysts for searching for new distinguishers.
Christina Boura, Daniel Coggia
doaj   +1 more source

Optimal mapping of joint faults into healthy joint velocity space for fault-tolerant redundant manipulators [PDF]

open access: yes, 2011
redundant ...
Abdi   +12 more
core   +3 more sources

Distributed-Memory Parallel Algorithms for Sparse Matrix and Sparse Tall-and-Skinny Matrix Multiplication [PDF]

open access: yesInternational Conference for High Performance Computing, Networking, Storage and Analysis
We consider a sparse matrix-matrix multiplication (SpGEMM) setting where one matrix is square and the other is tall and skinny. This special variant, TS-SpGEMM, has important applications in multi-source breadth-first search, influence maximization ...
Isuru Ranawaka   +5 more
semanticscholar   +1 more source

Effect of creatine ethyl ester supplementation and resistance training on hormonal changes, body composition and muscle strength in underweight non-athlete men

open access: yesBiomedical Human Kinetics, 2019
Study aim: The aim of this study to determine whether creatine ethyl ester (CEE) supplementation combined with resistance training (RT) is effective for improving hormonal changes, body composition and muscle strength in underweight non-athlete men.
Arazi Hamid   +2 more
doaj   +1 more source

Skinny, Slim, dan Thin: Analisis Berbasis Korpus Kata Sifat Identik dan Implikasinya pada Pengajaran Bahasa Inggris

open access: yesRanah: Jurnal Kajian Bahasa, 2019
This paper is an exploratory corpus-based investigation into a group of near synonymous adjectives: skinny, slim, and thin. It employs the British National Corpus (BNC) as data and Sketch Engine as data analysis instrument.
Millatul Islamiyah   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy