Results 51 to 60 of about 18,770 (194)
Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium [PDF]
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic attack applicable to cryptographic functions having a low-degree algebraic normal form over GF(2).
A. Maximov +16 more
core +2 more sources
PANDEMIA Y RESILIENCIA. APORTACIONES ACADÉMICAS EN TIEMPOS DE CRISIS
Audacter et opportune. Es alentador que haya quien, ante la pandemia, no se limite a lamentarse e incluso se atreva a pensar… Sí, pensar, ese ejercicio cada vez menos frecuente, sustituido en nuestra postmodernidad por los de imaginar y sentir.
Francisco Crosas
doaj +1 more source
On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography [PDF]
Lattice-based cryptography is one of the most promising branches of quantum resilient cryptography, offering versatility and efficiency. Discrete Gaussian samplers are a core building block in most, if not all, lattice-based cryptosystems, and optimised ...
Howe, James +4 more
core +1 more source
Looking up music in two ‘encyclopedias’ printed in 1501
Abstract A modern user of a printed encyclopedia expects to find concise entries on a wide range of subjects organised alphabetically for ease of reference. In the fifteenth and sixteenth centuries a number of scholarly texts of a particularly long and wide‐ranging character were essentially ‘encyclopedized’ through the provision of compendious subject
Tim Shephard, Charlotte Hancock
wiley +1 more source
«Instructions of the Visitors to Parishers in Electoral Saxony» by Philip Melanchthon: introductory article and the commented translation of the chapters «On everyday activities in churches» and «On schools» [PDF]
This publication is the first Russian translation of excerpts from Philip Melanchthon’s «Instructions». The text established the normative order (Ordnung), which should have been followed locally, both in terms of dogma (which covers a significant part ...
Zinaida Andreevna Lurie +1 more
doaj +1 more source
A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal +2 more
core +2 more sources
A question of genre: Philip Melanchthon's oratorical debut at Wittenberg University
Abstract The speech Philip Melanchthon gave on 29 August 1518 at the University of Wittenberg to initiate his professorship is an impressive piece of humanist idealism. Already its title, De corrigendis adolescentiae studiis (On the reform of the studies for the young) reveals his earnest ambitions in introducing reform.
Isabella Walser‐Bürgler
wiley +1 more source
Apresento neste ensaio alguns argumentos em defesa de uma proposta de metafilosofia que fornece uma resposta abrangente, formal e metodológica à questão “como se faz filosofia?”, tomada como anterior e mais fundamental do que a questão tradicional “o que
Almeida, Nazareno Eduardo de
doaj
According to UNESCO estimates, there are approximately one billion people in the world who can neither read nor write. One sixth of the world population has never seen a schoolbook.
Baldzuhn, Michael
core +1 more source
Correlation power analysis of Trivium [PDF]
ABSTRACTCorrelation power analysis (CPA) has been a powerful and thoroughly studied threat for implementations of block ciphers and public key algorithms but not yet for stream ciphers. This paper proposes a novel CPA attack on the hardware‐oriented stream cipher Trivium, one of the finally chosen ciphers by the eSTREAM project.
Yanyan Jia +3 more
openaire +1 more source

