Results 61 to 70 of about 15,909 (208)

Key Committing Security of AEZ and More

open access: yesIACR Transactions on Symmetric Cryptology, 2023
For an Authenticated Encryption with Associated Data (AEAD) scheme, the key committing security refers to the security notion of whether the adversary can produce a pair of distinct input tuples, including the key, that result in the same output.
Yu Long Chen   +9 more
doaj   +1 more source

Structural problems without structural solutions? Youth leaders' perceptions of their community

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract As young people explore and reflect on the conditions of their neighborhoods and communities, they can forge a critical consciousness—merging their perspectives and analysis to direct both individual and collective actions. Photovoice is a methodological tool that allows participants to document their perspectives and analysis and discuss with
Linnea L. Hjelm   +4 more
wiley   +1 more source

Key‐dependent side‐channel cube attack on CRAFT

open access: yesETRI Journal, 2021
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side‐channel cube attacks.
Kok‐An Pang   +1 more
doaj   +1 more source

Reflexive thematic analysis and men's embodiment following injury or illness: A worked example

open access: yesAnatomical Sciences Education, EarlyView.
Abstract Reflexive thematic analysis (reflexive TA) originated within psychology and the social sciences and has become an increasingly popular qualitative analytic method across a range of disciplines. In this article, we offer a brief methodological guide for researchers hoping to use the method, suitable for beginners through to those experienced in
Gareth Terry, Nikki Hayfield
wiley   +1 more source

Turning Online Ciphers Off

open access: yesIACR Transactions on Symmetric Cryptology, 2017
CAESAR has caused a heated discussion regarding the merits of one-pass encryption and online ciphers. The latter is a keyed, length preserving function which outputs ciphertext blocks as soon as the respective plaintext block is available as input.
Elena Andreeva   +5 more
doaj   +1 more source

XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing [PDF]

open access: yes, 2021
Tweakable block ciphers are important primitives for designing cryptographic schemes with high security. In the absence of a standardized tweakable block cipher, constructions built from classical block ciphers remain an interesting research topic in ...
Ashwin Jha   +4 more
core  

Supporting or stifling? Experiences of beginning teachers working within the Early Career Framework

open access: yesBritish Educational Research Journal, EarlyView.
Abstract This study discusses the experiences of a group of new teachers in England since the introduction of the Early Career Framework (ECF), against the backdrop of the global teacher recruitment and retention crisis. The experiences of new teachers within the ECF are under‐researched.
Lorna Smith   +2 more
wiley   +1 more source

A General Construction of Tweakable Block Ciphers and Different Modes of Operations [PDF]

open access: yesIEEE Transactions on Information Theory, 2006
This work builds on earlier work by Rogaway at Asiacrypt 2004 on tweakable block cipher (TBC) and modes of operations. Our first contribution is to generalize Rogaway's TBC construction by working over a ring and by the use of a masking sequence of functions. The ring can be instantiated as either GF or as .
Debrup Chakraborty, Palash Sarkar
openaire   +1 more source

Optimization of 3D‐Printed Structured Packings—Current State and Future Developments

open access: yesChemie Ingenieur Technik, EarlyView.
This paper gives an overview about structured packing development for distillation, surveying heuristic development cycles, computational fluid dynamics simulations, and additive manufacturing techniques. The emerging application of shape optimization to improve packings is emphasized, and its benefits, impact, and limitations are discussed.
Dennis Stucke   +3 more
wiley   +1 more source

Building PRFs from TPRPs: Beyond the Block and the Tweak Length Bounds

open access: yesIACR Transactions on Symmetric Cryptology
A secure n-bit tweakable block cipher (TBC) using t-bit tweaks can be modeled as a tweakable uniform random permutation, where each tweak defines an independent random n-bit permutation.
Wonseok Choi, Jooyoung Lee, Yeongmin Lee
doaj   +1 more source

Home - About - Disclaimer - Privacy