Results 131 to 140 of about 1,782,571 (254)

Cryptanalysis of novel extended multivariate public key cryptosystem

open access: yesTongxin xuebao, 2015
The novel extended multivariate public key cryptosystem is a new security enhancement method on multivariate public key cryptosystems,which is proposed by Qiao,et al.A nonlinear invertible transformation was used,named“tame transformation”,on the ...
Xu-yun NIE, Bo LIU, Gang LU, Ting ZHONG
doaj  

Eco‐Epidemiological Mathematical Model Analysis With Time Delays and Hopf Bifurcation

open access: yesNatural Resource Modeling, Volume 39, Issue 2, May 2026.
ABSTRACT Ecological and infection predator prey mathematical model is important tool for understanding complex systems and forecasting outcomes biologically. Incorporating saturation mass action incidence rates representing the rate of susceptible prey infection as a function of time along with time delay terms, makes more realistic and reflective of ...
Solomon Molla Alemu   +2 more
wiley   +1 more source

Does Aromaticity Drive Metal Cation Binding to Nanographenes? Insights Into Regioselectivity and Cation‐π$$ \pi $$ Bonding

open access: yesJournal of Computational Chemistry, Volume 47, Issue 10, 15 April 2026.
Aromaticity of a ring by itself does not explain the binding energies of alkali and alkaline earth metal cations with nanographenes, but when combined with the Fukui function, it does. ABSTRACT Nanographenes, a subclass of polycyclic aromatic hydrocarbons (PAHs), have attracted significant interest due to their unique electronic properties and broad ...
Omkar Charapale   +3 more
wiley   +1 more source

Unmasking stealthy attacks on nonlinear DAE models of power grids

open access: yesInternational Journal of Electrical Power & Energy Systems
Smart grids are inherently susceptible to various types of malicious cyberattacks that have all been documented in the recent literature. Traditional cybersecurity research on power systems often utilizes simplified models that fail to capture the ...
Abdallah Alalem Albustami   +2 more
doaj   +1 more source

Synthesis, Structure, and Thin Film Optical Properties of a Chiral Benzothiazole‐Derived Squaraine

open access: yesChemPhysChem, Volume 27, Issue 7, 14 April 2026.
Solution‐processed thin films can be sensitive to the choice of solvent and thermal annealing, which we explore for a chiral benzothiazole squaraine. We observe peculiarly shaped excitonic circular dichroism in uniaxially anisotropic thin films, in which the presumed Davydov bands are spatially distributed exclusively into in‐plane (UDC) and out‐of ...
Marvin F. Schumacher   +4 more
wiley   +1 more source

Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form

open access: yesInternational Conference on the Theory and Application of Cryptology and Information Security, 2014
J. Faugère   +2 more
semanticscholar   +1 more source

A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers

open access: yesInternational Conference on Network and System Security, 2014
Pratish Datta   +2 more
semanticscholar   +1 more source

Algebraic Adversarial Attacks on Explainability Models

open access: yes
Classical adversarial attacks are phrased as a constrained optimisation problem. Despite the efficacy of a constrained optimisation approach to adversarial attacks, one cannot trace how an adversarial point was generated. In this work, we propose an algebraic approach to adversarial attacks and study the conditions under which one can generate ...
Simpson, Lachlan   +5 more
openaire   +2 more sources

An Improved Algebraic Attack on Hamsi-256

open access: yesFast Software Encryption Workshop, 2011
Itai Dinur, A. Shamir
semanticscholar   +1 more source

Parametric action of homomorphic image of modular group and it's application in image encryption. [PDF]

open access: yesSci Rep
Rafiq A   +7 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy