Results 131 to 140 of about 1,782,571 (254)
Cryptanalysis of novel extended multivariate public key cryptosystem
The novel extended multivariate public key cryptosystem is a new security enhancement method on multivariate public key cryptosystems,which is proposed by Qiao,et al.A nonlinear invertible transformation was used,named“tame transformation”,on the ...
Xu-yun NIE, Bo LIU, Gang LU, Ting ZHONG
doaj
Eco‐Epidemiological Mathematical Model Analysis With Time Delays and Hopf Bifurcation
ABSTRACT Ecological and infection predator prey mathematical model is important tool for understanding complex systems and forecasting outcomes biologically. Incorporating saturation mass action incidence rates representing the rate of susceptible prey infection as a function of time along with time delay terms, makes more realistic and reflective of ...
Solomon Molla Alemu +2 more
wiley +1 more source
Aromaticity of a ring by itself does not explain the binding energies of alkali and alkaline earth metal cations with nanographenes, but when combined with the Fukui function, it does. ABSTRACT Nanographenes, a subclass of polycyclic aromatic hydrocarbons (PAHs), have attracted significant interest due to their unique electronic properties and broad ...
Omkar Charapale +3 more
wiley +1 more source
Unmasking stealthy attacks on nonlinear DAE models of power grids
Smart grids are inherently susceptible to various types of malicious cyberattacks that have all been documented in the recent literature. Traditional cybersecurity research on power systems often utilizes simplified models that fail to capture the ...
Abdallah Alalem Albustami +2 more
doaj +1 more source
Synthesis, Structure, and Thin Film Optical Properties of a Chiral Benzothiazole‐Derived Squaraine
Solution‐processed thin films can be sensitive to the choice of solvent and thermal annealing, which we explore for a chiral benzothiazole squaraine. We observe peculiarly shaped excitonic circular dichroism in uniaxially anisotropic thin films, in which the presumed Davydov bands are spatially distributed exclusively into in‐plane (UDC) and out‐of ...
Marvin F. Schumacher +4 more
wiley +1 more source
Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form
J. Faugère +2 more
semanticscholar +1 more source
A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers
Pratish Datta +2 more
semanticscholar +1 more source
Algebraic Adversarial Attacks on Explainability Models
Classical adversarial attacks are phrased as a constrained optimisation problem. Despite the efficacy of a constrained optimisation approach to adversarial attacks, one cannot trace how an adversarial point was generated. In this work, we propose an algebraic approach to adversarial attacks and study the conditions under which one can generate ...
Simpson, Lachlan +5 more
openaire +2 more sources
An Improved Algebraic Attack on Hamsi-256
Itai Dinur, A. Shamir
semanticscholar +1 more source
Parametric action of homomorphic image of modular group and it's application in image encryption. [PDF]
Rafiq A +7 more
europepmc +1 more source

