Search

Your search keyword '"ARX"' showing total 614 results

Search Constraints

Start Over You searched for: Descriptor "ARX" Remove constraint Descriptor: "ARX"
614 results on '"ARX"'

Search Results

1. GFSPX: an efficient lightweight block cipher for resource-constrained IoT nodes.

2. The Aggravation of Neuropsychiatric Symptoms in the Offspring of a Korean Family with Intellectual Disability and Developmental Delay Caused by a Novel ARX p.Lys385Ter Variant.

3. New linear approximation of modular addition and improved differential-linear cryptanalysis of SPARX-64/128.

4. Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs

6. Comparative Analysis of Data-Driven Models for DC Motors with Varying Payloads

7. Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128

8. The Aggravation of Neuropsychiatric Symptoms in the Offspring of a Korean Family with Intellectual Disability and Developmental Delay Caused by a Novel ARX p.Lys385Ter Variant

9. Type 1 early infantile epileptic encephalopathy: A case report and literature review.

10. ARX 型密码算法的设计与分析.

11. Fixed-size LS-SVM LPV System Identification for Large Datasets.

12. Coordinated Gene Expression and Chromatin Regulation during Hydra Head Regeneration.

14. Meet-in-the-Filter and Dynamic Counting with Applications to Speck

15. Type 1 early infantile epileptic encephalopathy: A case report and literature review

16. A subspace based method for modelling building's thermal dynamic in district heating system and parameter extrapolation verification.

17. Predicting recurrence in pancreatic neuroendocrine tumours: role of ARX and alternative lengthening of telomeres (ALT).

18. Analysis of rotation and shift based diffusion functions.

19. FPGA implementation novel lightweight MBRISI cipher.

20. Cortical interneuron development is affected in 4H leukodystrophy.

21. Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró.

22. Variants of Chaotic Grey Wolf Heuristic for Robust Identification of Control Autoregressive Model.

23. Self-tuning proportional-derivative pitch control for internal fault-tolerance in wind turbine benchmark.

24. Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró

26. Improved Differential Attack on Round-Reduced LEA

27. Implicit White-Box Implementations: White-Boxing ARX Ciphers

30. Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha

31. Automated Truncation of Differential Trails and Trail Clustering in ARX

32. An Improved Method for Removing the Artifacts of Electrooculography

33. Aggressive versus indolent insulinomas: new clinicopathological insights.

34. Modeling and Position Control of Fiber Braided Bending Actuator Using Embedded System.

35. Improved rotational‐XOR cryptanalysis of Simon‐like block ciphers

36. SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers

37. Cryptanalysis of Reduced Round ChaCha – New Attack & Deeper Analysis

38. Bypassing Mendel's First Law: Transmission Ratio Distortion in Mammals.

39. GFRX: A New Lightweight Block Cipher for Resource-Constrained IoT Nodes.

40. Rotational Differential-Linear Cryptanalysis Revisited.

41. Control of Precalciner Temperature in the Cement Industry: A Novel Method of Hammerstein Model Predictive Control with ISSA.

42. On the Probability and Automatic Search of Rotational-XOR Cryptanalysis on ARX Ciphers.

43. Forecasting Electricity Prices: Autoregressive Hybrid Nearest Neighbors (ARHNN) Method

44. Rotational Cryptanalysis from a Differential-Linear Perspective : Practical Distinguishers for Round-Reduced FRIET, Xoodoo, and Alzette

45. Kendali MRAC PID pada Kecepatan Motor DC dengan Analisa Robustness

46. Effect of redox partner binding on CYP101D1 conformational dynamics

47. Ultraconserved Enhancers Are Required for Normal Development.

48. Using Market News Sentiment Analysis for Stock Market Prediction.

49. Dwarf Mongoose Optimization Metaheuristics for Autoregressive Exogenous Model Identification.

50. Improved Differential-Linear Attacks with Applications to ARX Ciphers.

Catalog

Books, media, physical & digital resources