Limpar
67 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Capítulo de livro Acesso aberto Revisado por pares

Antonio Flórez Gutiérrez, Gaëtan Leurent, Maŕıa Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras,

$$\mathsf {Gimli}$$ is a family of cryptographic primitives (both a hash function and an AEAD scheme) that has been ... for standardizing new lightweight designs. The candidate $$\mathsf {Gimli}$$ is based on the permutation $$\mathsf {Gimli}$$ , which was presented at CHES 2017. In this ... it. We exploit the slow diffusion in $$\mathsf {Gimli}$$ and its internal symmetries to build, for the ... out of the full 24 rounds of $$\mathsf {Gimli}$$ that has been implemented. Next, we give (full ... and semi-free-start collision attacks on $$\mathsf {Gimli}$$ -Hash, reaching respectively up to 12 and 18 ...

Tópico(s): Quantum-Dot Cellular Automata

2020 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

David Campos, Sérgio Matos, José Luís Oliveira,

... wider application outside text mining research. We present Gimli, an open-source, state-of-the-art tool for automatic recognition of biomedical names. Gimli includes an extended set of implemented and user- ... to combine different trained models is also provided. Gimli achieves an F-measure of 87.17% on ... JNLPBA corpus, significantly outperforming existing open-source solutions. Gimli is an off-the-shelf, ready to use ... through a configuration file. Advanced users can integrate Gimli in their text mining workflows through the provided ...

Tópico(s): Genomics and Rare Diseases

2013 - BioMed Central | BMC Bioinformatics

Capítulo de livro Revisado por pares

Fukang Liu, Takanori Isobe, Willi Meier,

... our new technique will be applied to the Gimli permutation, which was proposed in CHES 2017. As ... reveal that some existing differential characteristics of reduced Gimli are indeed incompatible, one of which is found in the Gimli document. In addition, since only the permutation is analyzed in the Gimli document, we are lead to carry out a ... and the authenticated encryption (AE) scheme specified for Gimli, which has become a second round candidate of ... our analysis does not threaten the security of Gimli.

Tópico(s): Chaos-based Image/Signal Encryption

2020 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Michael Gruber, Matthias Probst, Patrick Karl, Thomas Schamberger, Lars Tebelmann, Michael Tempelmeier, Georg Sigl,

... orthogonal protection, and implement the DOMREP concept on GIMLI, a round two NIST LWC competition candidate, on a Xilinx Artix-7 FPGA. Our implementation of GIMLI is verified to be resistant against univariate first- ... well as multiple bit faults. Our implementation of GIMLI achieves the expected security level according to these ... the area overhead for our protected implementation of GIMLI.

Tópico(s): Security and Verification in Computing

2021 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Information Forensics and Security

Artigo Acesso aberto Revisado por pares

Safiullah Khan, Wai‐Kong Lee, Seong Oun Hwang,

... lightweight authenticated encryption (AE) and hash function called Gimli, and applies it to a state-of-the- ... TP of 740 Mbps and 420 Mbps for Gimli hash and Gimli AE, respectively, and for throughput-oriented implementation, the ...

Tópico(s): RFID technology advancements

2021 - Institute of Electrical and Electronics Engineers | IEEE Access

Artigo Revisado por pares

James T. Teller, Lewis A. Owen,

ABSTRACT Gimli beach in Manitoba is one of the lowest elevation beaches in the southern Lake Agassiz basin, and ... Ten new optically stimulated luminescence (OSL) ages from Gimli beach yield ages mostly ranging from 9.7 ± ... ascribe an age of about 10 ka to Gimli beach, which is several centuries before overflow from ...

Tópico(s): Maritime and Coastal Archaeology

2020 - Wiley | Journal of Quaternary Science

Artigo Acesso aberto Revisado por pares

Fukang Liu, Takanori Isobe, Willi Meier,

The Gimli permutation proposed in CHES 2017 was designed for cross-platform performance. One main strategy to achieve such ... exploited to construct a distinguisher for the full Gimli permutation with time complexity 264. By utilizing a ... bias still remains. Moreover, for the 18-round Gimli permutation, we could construct a distinguisher even with ... utilized to accelerate the preimage attacks on reduced Gimli-Hash and Gimli-XOF-128 with a divide-and-conquer method. As a consequence, the preimage attacks on reduced Gimli-Hash and Gimli-XOF-128 can reach up ...

Tópico(s): Cryptography and Data Security

2021 - | IACR Transactions on Symmetric Cryptology

Artigo Acesso aberto Revisado por pares

Antonio Flórez-Gutiérrez, Gaëtan Leurent, Maŕıa Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras,

$$\mathsf {Gimli}$$ is a family of cryptographic primitives (both a hash function and an AEAD scheme) that has been ... for standardizing new lightweight designs. The candidate $$\mathsf {Gimli}$$ is based on the permutation $$\mathsf {Gimli}$$ , which was presented at CHES 2017. In this ... it. We exploit the slow diffusion in $$\mathsf {Gimli}$$ and its internal symmetries to build, for the ... out of the full 24 rounds of $$\mathsf {Gimli}$$ that has been implemented. Next, we give (full ... and semi-free start collision attacks on $$\mathsf {Gimli}$$ -Hash, reaching, respectively, up to 12 and 18 ...

Tópico(s): Quantum-Dot Cellular Automata

2021 - Springer Science+Business Media | Journal of Cryptology

Capítulo de livro Acesso aberto Revisado por pares

Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat C. Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François‐Xavier Standaert, Yosuke Todo, Benoît Viguier,

This paper presents Gimli, a 384-bit permutation designed to achieve high security with high performance across a broad range of platforms, including ...

Tópico(s): Physical Unclonable Functions (PUFs) and Hardware Security

2017 - Springer Science+Business Media | Lecture notes in computer science

Capítulo de livro

Derek Johnson, Sölmundur Karl Pálsson,

... in the case of the fishers operating from Gimli on Lake Winnipeg but in this chapter we ...

Tópico(s): Cambodian History and Society

2015 - Springer International Publishing | MARE publication series

Artigo Acesso aberto Revisado por pares

Emanuele Bellini, David Gérault, Anna Hambitzer, Matteo Rossi,

... of-the-art for PRESENT, KATAN, TEA and GIMLI.

Tópico(s): Chaos-based Image/Signal Encryption

2023 - | IACR Transactions on Symmetric Cryptology

Artigo Acesso aberto Revisado por pares

Arya Yudidharma, Nicholas Nathaniel, Tang Nyquel Gimli, Said Achmad, Aditya Kurniawan,

Internet of Things is a paradigm that aims at connectivity for everything, such as computing devices, machines, objects, people and so on. Messaging protocols and electronic platforms are needed in the implementation of Internet of Things(IoT) based smart homes. These messaging protocols and electronic platforms enable the communication between home appliances and devices to happen. This paper would like to determine the commonly used messaging protocols and electronic platforms, and the messaging ...

Tópico(s): IoT Networks and Protocols

2023 - Elsevier BV | Procedia Computer Science

Artigo Acesso aberto Revisado por pares

Gregor Leander, Thorben Moos, Amir Moradi, Shahram Rasoolzadeh,

... hardware than any other known encryption primitive (including Gimli in Even-Mansour scheme and the Orthros pseudorandom ...

Tópico(s): Chaos-based Image/Signal Encryption

2021 - | IACR Transactions on Cryptographic Hardware and Embedded Systems

Artigo Revisado por pares

KyungHyun Han, Wai‐Kong Lee, Seong Oun Hwang,

Tópico(s): Cryptographic Implementations and Security

2021 - Springer Science+Business Media | Cluster Computing

Artigo Acesso aberto Revisado por pares

Ming-Siang Huang, Po-Ting Lai, Pei-Yen Lin, Yu-Ting You, Richard Tzong‐Han Tsai, Wen-Lian Hsu,

... in three open sources NER systems including BANNER, Gimli and NERSuite. In the same circumstance, all the ...

Tópico(s): Natural Language Processing Techniques

2020 - Oxford University Press | Briefings in Bioinformatics

Artigo Revisado por pares

А. В. Жуков, Yury Yasyukevich, Aleksei E. Bykov,

Tópico(s): Geophysical and Geoelectrical Methods

2020 - Springer Science+Business Media | GPS Solutions

Capítulo de livro Acesso aberto Revisado por pares

Fábio Campos, Tim Kohlstadt, Steffen Reith, Marc Stöttinger,

... XMSS using optimised implementations of SHA-256, SHAKE256, Gimli-Hash, and different variants of Keccak. Furthermore, we ...

Tópico(s): Quantum Computing Algorithms and Architecture

2020 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

James T. Teller, R. A. McGinn, Haresh M. Rajapara, A. D. Shukla, A. K. Singhvi,

... after 14.5 ka. OSL ages on the Gimli beach 170 km to the east are >3000 ...

Tópico(s): Cryospheric studies and observations

2018 - Cambridge University Press | Quaternary Research

Artigo Revisado por pares

Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer,

... by Keccak-p, while it is dimensioned like Gimli for efficiency on low-end processors. The structure ...

Tópico(s): Cryptography and Residue Arithmetic

2018 - | IACR Transactions on Symmetric Cryptology

Artigo Acesso aberto Revisado por pares

Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer,

... by Keccak-p, while it is dimensioned like Gimli for efficiency on low-end processors. The structure ...

Tópico(s): Cryptography and Residue Arithmetic

2018 - | IACR Transactions on Symmetric Cryptology

Capítulo de livro Revisado por pares

Carlos Andres Lara-Nino, Arturo Díaz-Pérez, Miguel Morales‐Sandoval,

... and compare them against implementations for Present and Gimli under fair conditions. The hardware description for our ...

Tópico(s): Coding theory and cryptography

2018 - Springer Science+Business Media | Lecture notes in computer science

Artigo

Markus Loewer, Norman Wagner, Jan Igel,

... means of the Geophysical Inversion and Modelling Library (GIMLi). Splitting the measured complex dielectric permittivity data using ...

Tópico(s): Geophysical and Geoelectrical Methods

2013 - | Proceedings

Artigo Revisado por pares

Luis Loría, Elie Y. Hajj, Peter E. Sebaaly, M. J. Barton, S Kass, T Liske,

... from field sections on provincial Highway 8 between Gimli and Hnausa in Manitoba, Canada. A comparison between ...

Tópico(s): Geotechnical Engineering and Underground Structures

2011 - SAGE Publishing | Transportation Research Record Journal of the Transportation Research Board

Artigo Revisado por pares

Candice Fredrick, Sam McBride,

... did J.R.R. Tolkien when he made Gimli the Dwarf belligerent against anyone questioning the primacy ...

Tópico(s): Violence, Religion, and Philosophy

2007 - Mythopoeic Society | Mythlore

Artigo Revisado por pares

David Leverington, James T. Teller,

... to the Great Lakes ended before the succeeding Gimli stage.

Tópico(s): Cryospheric studies and observations

2003 - NRC Research Press | Canadian Journal of Earth Sciences

Artigo Acesso aberto Revisado por pares

Ignacio Marı́n, Carlos Lloréns,

... have called Tit-for-tat1, Tit-for-tat2, Gimli, Gloin, Legolas, and Little Athila. We confirm that ...

Tópico(s): Plant Disease Resistance and Genetics

2000 - Oxford University Press | Molecular Biology and Evolution

Artigo Revisado por pares

M. McFarland, B. A. Ridley, M. H. Proffitt, D. L. Albritton, Thomas L. Thompson, W.J. Harrop, R. Winkler, A. L. Schmeltekopf,

... from Palestine, Texas (32°N), the third from Gimli, Manitoba (50°N). NO was detected using the ...

Tópico(s): Ionosphere and magnetosphere dynamics

1986 - American Geophysical Union | Journal of Geophysical Research Atmospheres

Artigo Revisado por pares

W A Johnston,

... James T. Teller, Lewis A. Owen Age of Gimli beach of Lake Agassiz based on new OSL ...

Tópico(s): Maritime and Coastal Archaeology

1916 - University of Chicago Press | The Journal of Geology

Artigo Revisado por pares

Siwei Chen, Zejun Xiang, Xiangyong Zeng, Shasha Zhang,

Tópico(s): Physical Unclonable Functions (PUFs) and Hardware Security

2021 - Springer Nature | Science China Information Sciences

Artigo Acesso aberto Revisado por pares

А. В. Жуков, Yury Yasyukevich, Aleksei E. Bykov,

In the original article published, the references Wang et al. 2016a and Wang et al. 2016b are incorrect.

Tópico(s): Earthquake Detection and Analysis

2020 - Springer Science+Business Media | GPS Solutions