Results 101 to 110 of about 15,909 (208)
Block scheduling in practice: An optimal decomposition strategy for nonidentical operating rooms
Abstract We develop and implement a Master Surgery Schedule for a real‐life hospital, assigning operating room (OR) time to surgical specialties over a multi‐week horizon. Through action research, we identify a critical operational challenge: the issue of split blocks. Split blocks allow two specialties to share an OR on the same day—one in the morning,
Vincent J. J. van Ham +2 more
wiley +1 more source
A Meet-in-the-middle Attack Method of Deoxys-BC [PDF]
The Deoxys-BC adopting the SPN structure and TWEAK framework is a lightweight tweakable block cipher published at ASIACRPYPT 2014.By researching the internal characteristic and key schedule of the Deoxys-BC,a 6-round meet-in-the-middle distinguisher ...
LI Zheng, LI Manman, CHEN Shaozhen
doaj +1 more source
Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE [PDF]
Subspace trail cryptanalysis is a very recent new cryptanalysis technique, and includes differential, truncated differential, impossible differential, and integral attacks as special cases.
C Beierle +12 more
core +2 more sources
AI literacy: A core practice in world language education
Abstract The emergence of artificial intelligence (AI) innovations like ChatGPT presents new opportunities and challenges for world languages (WL) education. WL teacher education programs must prepare preservice teachers with AI literacy to help them effectively integrate these technologies into teaching.
Xinyue Lu +2 more
wiley +1 more source
Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM
In this work, we focus on LS-design ciphers Fantomas, Robin, and iSCREAM. LS-designs are a family of bitslice ciphers aimed at efficient masked implementations against side-channel analysis.
Ashutosh Dhar Dwivedi +3 more
doaj +1 more source
Memory Encryption for Smart Cards Barı¸s Ege 1, Elif Bilge Kavun 2,andTolgaYalçın 2 [PDF]
. With the latest advances in attack methods, it has become increasingly more difficult to secure data stored on smart cards, especially on non-volatile memories (NVMs), which may store sensitive information such as cryptographic keys or program code ...
core
ABSTRACT Artificial intelligence (AI) brings great potential for manufacturers, but clashes with the established culture due to the unexplainable and opaque nature of the solutions it provides. Having little experience in AI and machine learning (ML), most manufacturing leaders experience barriers implementing AI.
Benjamin van Giffen +5 more
wiley +1 more source
BBB Secure Arbitrary Length Tweak TBC from n-bit Block Ciphers [PDF]
At FSE\u2715, Mennink introduced two tweakable block ciphers, $\widetilde{F}[1]$ and $\widetilde{F}[2]$, both utilizing an $n$-bit tweak. It was demonstrated that $\widetilde{F}[1]$ is secure for up to $2^{2n/3}$ queries, while $\widetilde{F}[2]$ is ...
Arghya Bhattacharjee +4 more
core
Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound [PDF]
Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a $wn$-bit (tweakable) block cipher from $n$-bit public permutations.
Benoît Cogliati, Jooyoung Lee
core
Old Skool Spinning and Syncing: Memory, Technologies, and Occupational Membership in a DJ Community
Abstract We show how technology and its temporal instantiations act as material‐relational mnemonic devices that provide temporal anchors for collective remembering in occupations and form the basis of what we call an 'occupational mnemonic community'.
Hamid Foroughi +2 more
wiley +1 more source

