Results 51 to 60 of about 18,770 (194)

Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium [PDF]

open access: yes, 2009
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic attack applicable to cryptographic functions having a low-degree algebraic normal form over GF(2).
A. Maximov   +16 more
core   +2 more sources

PANDEMIA Y RESILIENCIA. APORTACIONES ACADÉMICAS EN TIEMPOS DE CRISIS

open access: yesRevista Panamericana de Pedagogía, 2021
Audacter et opportune. Es alentador que haya quien, ante la pandemia, no se limite a lamentarse e incluso se atreva a pensar… Sí, pensar, ese ejercicio cada vez menos frecuente, sustituido en nuestra postmodernidad por los de imaginar y sentir.
Francisco Crosas
doaj   +1 more source

On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography [PDF]

open access: yes, 2016
Lattice-based cryptography is one of the most promising branches of quantum resilient cryptography, offering versatility and efficiency. Discrete Gaussian samplers are a core building block in most, if not all, lattice-based cryptosystems, and optimised ...
Howe, James   +4 more
core   +1 more source

Looking up music in two ‘encyclopedias’ printed in 1501

open access: yesRenaissance Studies, Volume 38, Issue 4, Page 563-594, September 2024.
Abstract A modern user of a printed encyclopedia expects to find concise entries on a wide range of subjects organised alphabetically for ease of reference. In the fifteenth and sixteenth centuries a number of scholarly texts of a particularly long and wide‐ranging character were essentially ‘encyclopedized’ through the provision of compendious subject
Tim Shephard, Charlotte Hancock
wiley   +1 more source

«Instructions of the Visitors to Parishers in Electoral Saxony» by Philip Melanchthon: introductory article and the commented translation of the chapters «On everyday activities in churches» and «On schools» [PDF]

open access: yesРелигия, церковь, общество, 2019
This publication is the first Russian translation of excerpts from Philip Melanchthon’s «Instructions». The text established the normative order (Ordnung), which should have been followed locally, both in terms of dogma (which covers a significant part ...
Zinaida Andreevna Lurie   +1 more
doaj   +1 more source

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

A question of genre: Philip Melanchthon's oratorical debut at Wittenberg University

open access: yesRenaissance Studies, Volume 38, Issue 3, Page 363-378, June 2024.
Abstract The speech Philip Melanchthon gave on 29 August 1518 at the University of Wittenberg to initiate his professorship is an impressive piece of humanist idealism. Already its title, De corrigendis adolescentiae studiis (On the reform of the studies for the young) reveals his earnest ambitions in introducing reform.
Isabella Walser‐Bürgler
wiley   +1 more source

Entrando no teatro das formas: cenas de uma poética e uma dramaturgia para o fazer filosófico atual e sua gênese na república de Platão = Entering the theatre of forms: scenes from a poetics and a dramaturgy to the present philosophy-making and its genesis in Plato’s republic = Entrando en el teatro de las formas: escenas de una poética y una dramaturgia para el actual hacer filosófico y su génesis en la república de Platón

open access: yesVeritas, 2023
Apresento neste ensaio alguns argumentos em defesa de uma proposta de metafilosofia que fornece uma resposta abrangente, formal e metodológica à questão “como se faz filosofia?”, tomada como anterior e mais fundamental do que a questão tradicional “o que
Almeida, Nazareno Eduardo de
doaj  

Schoolbooks [PDF]

open access: yes, 2010
According to UNESCO estimates, there are approximately one billion people in the world who can neither read nor write. One sixth of the world population has never seen a schoolbook.
Baldzuhn, Michael
core   +1 more source

Correlation power analysis of Trivium [PDF]

open access: yesSecurity and Communication Networks, 2011
ABSTRACTCorrelation power analysis (CPA) has been a powerful and thoroughly studied threat for implementations of block ciphers and public key algorithms but not yet for stream ciphers. This paper proposes a novel CPA attack on the hardware‐oriented stream cipher Trivium, one of the finally chosen ciphers by the eSTREAM project.
Yanyan Jia   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy