Results 61 to 70 of about 807,165 (362)
ABSTRACT Objective To identify metabolic patterns in the brain and musculoskeletal system of stiff person syndrome spectrum disorders (SPSD) patients over time using PET imaging and evaluate the impact of immune therapy on metabolic activity as a surrogate for treatment response.
Munther M. Queisi +4 more
wiley +1 more source
Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts [PDF]
Recent results of Kaplan et al., building on work by Kuwakado and Morii, have shown that a wide variety of classically-secure symmetric-key cryptosystems can be completely broken by quantum chosen-plaintext attacks (qCPA).
G. Alagic, A. Russell
semanticscholar +1 more source
Accelerated Progression of Gait Impairment in Parkinson's Disease and REM Sleep Without Atonia
ABSTRACT Objective People with Parkinson's disease (PD) and rapid eye movement (REM) sleep without atonia (RSWA) often have more severe gait disturbances compared to PD without RSWA. The association between the presence and expression of RSWA and the rate of progression of gait impairment in PD is unknown.
Sommer L. Amundsen‐Huffmaster +11 more
wiley +1 more source
VISUAL SYMMETRIC SPEECH CRYPTOGRAPHY
Today Communication is mainly depends upon digital data communication. Data is sent across internet using sequence of bits. Data integrity is major issue in such a communication. To preserve data integrity of the message sent over the internet various method of cryptography is used.
Jainam Ashwinbhai Shah, Sanket Shah
openaire +3 more sources
Post-Quantum Cryptography: S381 Cyclic Subgroup of High Order
Currently there is an active Post-Quantum Cryptography (PQC) solutions search, which attempts to find cryptographic protocols resistant to attacks by means of for instance Shor polynomial time algorithm for numerical field problems like integer ...
Hecht, Pedro
core +1 more source
In this study, the mechanical response of Y‐shaped core sandwich beams under compressive loading is investigated, using deep feed‐forward neural networks (DFNNs) for predictive modeling. The DFNN model accurately captures stress–strain behavior, influenced by design parameters and loading rates.
Ali Khalvandi +4 more
wiley +1 more source
As a part of the field of cryptography, rotation symmetric Boolean functions have rich cryptographic significance. In this paper, based on the knowledge of integer compositions, we present a new construction of odd-variable rotation symmetric Boolean ...
Yindong Chen +3 more
doaj +1 more source
DEVELOPMENT OF PROCEDURES FOR MODIFYING THE CIPHER GOST 28147
The entry of mankind into the era of high technologies, the rapid growth of computer technology contributes to the expansion of the range of electronic services.
Сергій Євсєєв +3 more
doaj +1 more source
symmetric cryptography dagstuhl seminar 20041 [PDF]
This report documents the program and the outcomes of Dagstuhl Seminar 20041 "Symmetric Cryptography". The seminar was held on January 19-24, 2020 in Schloss Dagstuhl - Leibniz Center for Informatics. This was the seventh seminar in the series "Symmetric Cryptography". Previous editions were held in 2007, 2009, 2012, 2014, 2016, and 2018. Participants
Leander, Nils Gregor +3 more
openaire +3 more sources
The role of various alloying elements in face‐centered cubic aluminum on the barrier of a Shockley partial dislocation during its motion is presented. The study aims to understand how alloying atoms such as Mg, Si, and Zr affect the energy landscape for dislocation motion, thus influencing the solid solution hardening and softening in aluminum, which ...
Inna Plyushchay +3 more
wiley +1 more source

