Results 11 to 20 of about 18,770 (194)

Algebraic side‐channel attacks on Trivium stream cipher

open access: yesIET Communications
Algebraic Side‐Channel Attacks (ASCAs), first proposed by Renauld and Standaert in 2009, are a potent cryptanalysis method against block ciphers. In this paper, the authors initially utilize ASCAs to analyze the security of the Trivium stream cipher ...
Wenlong Sun, Jie Guan
doaj   +2 more sources

Pre-clinical enteropathy in healthy soft-coated wheaten terriers. [PDF]

open access: yesJ Vet Intern Med
Abstract Background Soft‐coated wheaten terriers (SCWTs) have a predisposition to the development of protein‐losing enteropathy (PLE). Early recognition of disease may improve morbidity and mortality in these and other at‐risk dogs. Preclinical inflammatory bowel disease (IBD), characterized by increased intestinal permeability, immune dysregulation ...
Tolbert MK   +11 more
europepmc   +2 more sources

Effect of calcifediol supplementation on renin-angiotensin-aldosterone system mediators in dogs with chronic kidney disease. [PDF]

open access: yesJ Vet Intern Med, 2022
Abstract Background Chronic kidney disease (CKD) leads to low serum concentrations of vitamin D metabolites. Thus, hypovitaminosis D associated with CKD might contribute to disease progression via increased concentration of renin angiotensin aldosterone system (RAAS) mediators.
Miller M   +4 more
europepmc   +2 more sources

Comment les Satires de Juvénal sont arrivées au Mont Saint-Michel ? (enquête sur Paris, BnF, lat. 8070-I et sur son modèle)

open access: yesTabularia, 2021
The analysis of the content of the first codicological unit of the manuscript Paris, BnF, lat. 8070 allows us to study how Juvenal was read at Mont Saint-Michel shortly after the arrival of the Benedictines around the year 1000.
Frédéric Duplessis
doaj   +1 more source

Using SAT Solvers to Finding Short Cycles in Cryptographic Algorithms [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2020
A desirable property of iterated cryptographic algorithms, such as stream ciphers or pseudo-random generators, is the lack of short cycles. Many of the previously mentioned algorithms are based on the use of linear feedback shift registers (LFSR) and ...
Władysław Dudzic, Krzysztof Kanciak
doaj   +1 more source

Integration of lightweight cryptography and watermarking with compression for high speed and reliable communication of digital images in IoT

open access: yesIET Image Processing, Volume 17, Issue 10, Page 2984-3001, 21 August 2023., 2023
In IoT sensors, which are used to record and send images, secure image transmission is of great importance. Therefore, we need to use encryption, watermarking and compression processes. Here, a new integrated method of lightweight encryption, watermarking and compression for the fast and secure transmission of images is proposed.
Hadi Nazari   +2 more
wiley   +1 more source

China's corporate credit reporting system: A comparison with the United States and Germany

open access: yesRegulation &Governance, Volume 17, Issue 3, Page 755-771, July 2023., 2023
Abstract Corporate credit reporting (CCR), which aims at increasing trust in corporates, constitutes an intriguing, yet understudied set of regulatory institutions as it is both a regulatory object and subject at the same time. Differences in national CCR systems pose challenges for multinational companies and have increasingly become a subject of ...
Theresa Krause   +4 more
wiley   +1 more source

Simon of Tournai's Stroke: The Image of an Irate Unbeliever

open access: yesJournal of Religious History, Volume 47, Issue 2, Page 243-273, June 2023., 2023
For centuries after his death in the late twelfth century, Simon of Tournai, a master of theology in the Parisian schools, had a reputation for being an unbeliever punished by God with a stroke. This article gathers the eight known medieval sources for his stroke and examines them from a mythogenetic perspective to demonstrate how different authors ...
Keagan Brewer
wiley   +1 more source

Maggay\u27s Global kingdom, global people: Living faithfully in a multicultural world [PDF]

open access: yes, 2013
Ce numéro de Trivium est consacré à un aspect de la réflexion de l’un des plus grands représentants de la pensée sociale en France, Emile Durkheim (1858-1917).
Müller, Hans-Peter, Terrier, Jean
core   +2 more sources

Similarity Property and Slide Attack of Block Cipher FESH

open access: yesIET Information Security, Volume 2023, Issue 1, 2023., 2023
This paper focuses on similarity properties and extension of the classical slide property of block ciphers. Taking FESH, an award‐winning block cipher of the National Cryptographic Algorithm Design Competition 2019, as an example, similarity properties of the encryption and key transformation are found, owing to the similar structures that the ...
Yafei Zheng, Wenling Wu, Taimur Bakhshi
wiley   +1 more source

Home - About - Disclaimer - Privacy