Results 41 to 50 of about 482,791 (290)
An Efficient Generation and Security Analysis of Substitution Box Using Fingerprint Patterns
Information and its security have attracted the research community in recent years with increasing usage of mobile applications. Mobile devices have different security options in data transmission such as reading some biometric values.
Oznur Sengel +2 more
doaj +1 more source
Substitution box generation using Chaos: An image encryption application
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
V.M. Silva-García +4 more
openaire +1 more source
Quantum Half and Full Spinning Operator-Based Nonlinear Confusion Component
The structure of a substitution box (S-box) is one of the principal ideas of the modern encryption techniques. The security of a modern encryption algorithm highly depends on its nonlinear confusion component.
Abdullah Alghafis
doaj +1 more source
A Novel Latin Square Image Cipher
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson +45 more
core +1 more source
Infinitary $\lambda$-Calculi from a Linear Perspective (Long Version) [PDF]
We introduce a linear infinitary $\lambda$-calculus, called $\ell\Lambda_{\infty}$, in which two exponential modalities are available, the first one being the usual, finitary one, the other being the only construct interpreted coinductively. The obtained
Lago, Ugo Dal
core +4 more sources
There exist several performance criteria for cryptographically-strong substitution boxes (S-boxes), which are often conflicting with each other. Constructing S-boxes that satisfy multiple criteria with optimal tradeoffs is one of the challenging tasks ...
Musheer Ahmad +5 more
doaj +1 more source
Efficient Open World Reasoning for Planning [PDF]
We consider the problem of reasoning and planning with incomplete knowledge and deterministic actions. We introduce a knowledge representation scheme called PSIPLAN that can effectively represent incompleteness of an agent's knowledge while allowing for ...
Henry Kautz +2 more
core +1 more source
Mapping the evolution of mitochondrial complex I through structural variation
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin +2 more
wiley +1 more source
The double random phase encoding (DRPE) system plays a significant role in encrypted systems. However, it is a linear system that leads to security holes in encrypted systems.
Peiran Tian, Runzhou Su
doaj +1 more source
Simple sentences, substitutions, and mistaken evaluations [PDF]
Many competent speakers initially judge that (i) is true and (ii) is false, though they know that (iii) is true. (i) Superman leaps more tall buildings than Clark Kent. (ii) Superman leaps more tall buildings than Superman.
Braun, D., Saul, J.M.
core +1 more source

