Results 11 to 20 of about 18,770 (194)
Algebraic side‐channel attacks on Trivium stream cipher
Algebraic Side‐Channel Attacks (ASCAs), first proposed by Renauld and Standaert in 2009, are a potent cryptanalysis method against block ciphers. In this paper, the authors initially utilize ASCAs to analyze the security of the Trivium stream cipher ...
Wenlong Sun, Jie Guan
doaj +2 more sources
Pre-clinical enteropathy in healthy soft-coated wheaten terriers. [PDF]
Abstract Background Soft‐coated wheaten terriers (SCWTs) have a predisposition to the development of protein‐losing enteropathy (PLE). Early recognition of disease may improve morbidity and mortality in these and other at‐risk dogs. Preclinical inflammatory bowel disease (IBD), characterized by increased intestinal permeability, immune dysregulation ...
Tolbert MK +11 more
europepmc +2 more sources
Effect of calcifediol supplementation on renin-angiotensin-aldosterone system mediators in dogs with chronic kidney disease. [PDF]
Abstract Background Chronic kidney disease (CKD) leads to low serum concentrations of vitamin D metabolites. Thus, hypovitaminosis D associated with CKD might contribute to disease progression via increased concentration of renin angiotensin aldosterone system (RAAS) mediators.
Miller M +4 more
europepmc +2 more sources
The analysis of the content of the first codicological unit of the manuscript Paris, BnF, lat. 8070 allows us to study how Juvenal was read at Mont Saint-Michel shortly after the arrival of the Benedictines around the year 1000.
Frédéric Duplessis
doaj +1 more source
Using SAT Solvers to Finding Short Cycles in Cryptographic Algorithms [PDF]
A desirable property of iterated cryptographic algorithms, such as stream ciphers or pseudo-random generators, is the lack of short cycles. Many of the previously mentioned algorithms are based on the use of linear feedback shift registers (LFSR) and ...
Władysław Dudzic, Krzysztof Kanciak
doaj +1 more source
In IoT sensors, which are used to record and send images, secure image transmission is of great importance. Therefore, we need to use encryption, watermarking and compression processes. Here, a new integrated method of lightweight encryption, watermarking and compression for the fast and secure transmission of images is proposed.
Hadi Nazari +2 more
wiley +1 more source
China's corporate credit reporting system: A comparison with the United States and Germany
Abstract Corporate credit reporting (CCR), which aims at increasing trust in corporates, constitutes an intriguing, yet understudied set of regulatory institutions as it is both a regulatory object and subject at the same time. Differences in national CCR systems pose challenges for multinational companies and have increasingly become a subject of ...
Theresa Krause +4 more
wiley +1 more source
Simon of Tournai's Stroke: The Image of an Irate Unbeliever
For centuries after his death in the late twelfth century, Simon of Tournai, a master of theology in the Parisian schools, had a reputation for being an unbeliever punished by God with a stroke. This article gathers the eight known medieval sources for his stroke and examines them from a mythogenetic perspective to demonstrate how different authors ...
Keagan Brewer
wiley +1 more source
Maggay\u27s Global kingdom, global people: Living faithfully in a multicultural world [PDF]
Ce numéro de Trivium est consacré à un aspect de la réflexion de l’un des plus grands représentants de la pensée sociale en France, Emile Durkheim (1858-1917).
Müller, Hans-Peter, Terrier, Jean
core +2 more sources
Similarity Property and Slide Attack of Block Cipher FESH
This paper focuses on similarity properties and extension of the classical slide property of block ciphers. Taking FESH, an award‐winning block cipher of the National Cryptographic Algorithm Design Competition 2019, as an example, similarity properties of the encryption and key transformation are found, owing to the similar structures that the ...
Yafei Zheng, Wenling Wu, Taimur Bakhshi
wiley +1 more source

