Semantic Scholar uses AI to extract papers important to this topic.
The mere number of various apparently different statistical attacks on block ciphers has raised the question about their… Expand To improve detection performance of quadrature amplitude modulation (QAM), signal space diversity (SSD) has been exploited and… Expand Post-calibration row- and column-correlated noise resulting from voltage instability in the electronics of the Thermal Emission… Expand Abstract The evolution of microtwins during high temperature creep deformation in a γ′ strengthened Ni-based superalloy has been… Expand We develop visual servo control to stabilize the image of moving soft tissue in B-mode ultrasound (US) imaging. We define the… Expand Abstract Data from the Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) have a significant advantage over… Expand Synthetic aperture radar interferometry (InSAR) is a powerful technique to derive three-dimensional terrain images. Interest is… Expand The growth of magnetic fluctuations in the inertial range of turbulence is investigated in terms of fluid particle dynamics. The… Expand In this paper we study the resistance of a block cipher against a class of general attacks which we call "iterated attacks". This… Expand Recently, we showed how to strengthen block ciphers by decorrelation techniques. In particular, we proposed two practical block… Expand