Обчислювальні характеристики підстановочно-перестановочних мереж з s-боксами розміром 16х16 біт [PDF]
В цій статті розглянута реалізація блочного шифру, який оснований на архітектурі гніздової постановочно-перестановочной сети (nested SPN), c блоками підстановки (S-боксами) розміром 16х16 біт в комп`ютерних системах.
Бевз, О. М.
core
Encoding !-tensors as !-graphs with neighbourhood orders
Diagrammatic reasoning using string diagrams provides an intuitive language for reasoning about morphisms in a symmetric monoidal category. To allow working with infinite families of string diagrams, !-graphs were introduced as a method to mark repeated ...
Quick, David
core +2 more sources
The simulation of action disorganisation in complex activities of daily living [PDF]
Action selection in everyday goal-directed tasks of moderate complexity is known to be subject to breakdown following extensive frontal brain injury. A model of action selection in such tasks is presented and used to explore three hypotheses concerning ...
Anderson JR +31 more
core +1 more source
On the Difficulty of Constructing Cryptographically Strong Substitution Boxes
JUCS - Journal of Universal Computer Science Volume Nr.
Zhang,Xian-Mo, Zheng,Yuliang
openaire +2 more sources
This study reveals a unique active site enriched in methionine residues and demonstrates that these residues play a critical role by stabilizing carbocation intermediates through novel sulfur–cation interactions. Structure‐guided mutagenesis further revealed variants with significantly altered product profiles, enhancing pseudopterosin formation. These
Marion Ringel +13 more
wiley +1 more source
Mobius Group Generated by Two Elements of Order 2, 4, and Reduced Quadratic Irrational Numbers
The construction of circuits for the evolution of orbits and reduced quadratic irrational numbers under the action of Mobius groups have many applications like in construction of substitution box (s-box), strong-substitution box (s.s-box), image ...
Dilshad Alghazzawi +4 more
doaj +1 more source
Cryptanalysis of Novel Image Encryption Scheme Based on Multiple Chaotic Substitution Boxes
In current years many chaos-based Substitution boxes (S-boxes) have been proposed. Recently, an image encryption technique based on multiple chaotic S-box was offered.
Ammar S. Alanazi +4 more
doaj +1 more source
Beta Reduction is Invariant, Indeed (Long Version) [PDF]
Slot and van Emde Boas' weak invariance thesis states that reasonable machines can simulate each other within a polynomially overhead in time. Is $\lambda$-calculus a reasonable machine?
Accattoli, Beniamino, Lago, Ugo Dal
core
The ubiquitin ligase RNF115 is required for the clearance of damaged lysosomes
Upon lysosomal rupture, an E3 ubiquitin ligase RNF115 translocates from the cytosol to the damaged lysosomal membrane. Moreover, RNF115 depletion impairs the clearance of damaged lysosomes, identifying it as a key regulator of lysosomal quality control.
Sae Nakanaga +3 more
wiley +1 more source
Outsourcing of Services, Imported Materials and the Demand for Heterogeneous Labour: An Application of a Generalised Box-Cox Function [PDF]
This paper examines the effects that purchased services and imported intermediate materials have on the labour demand for different skills in the manufacturing sector.
Falk, Martin, Koebel, Bertrand
core

