Results 51 to 60 of about 1,782,571 (254)
Improving Fast Algebraic Attacks [PDF]
An algebraic attack is a method for cryptanalysis which is based on finding and solving a system of nonlinear equations. Recently, algebraic attacks where found helpful in cryptanalysing LFSR-based stream ciphers. The efficiency of these attacks greatly depends on the degree of the nonlinear equations.
openaire +2 more sources
Physical Origin of Temperature Induced Activation Energy Switching in Electrically Conductive Cement
The temperature‐induced Arrhenius activation energy switching phenomenon of electrical conduction in electrically conductive cement originates from structural degradation within the biphasic ionic‐electronic conduction architecture and shows percolation‐governed characteristics: pore network opening dominates the low‐percolation regime with downward ...
Jiacheng Zhang +7 more
wiley +1 more source
New directions in cryptanalysis of block ciphers. [PDF]
The algebraic expression of the Advanced Encryption Standard (AES) RIJNDAEL S-box involved only 9 terms. The selected mapping for RIJNDAEL S-box has a simple algebraic expression.
Md Said, Mohamad Rushdan +1 more
core
Attack Defense Trees with Sequential Conjunction [PDF]
Attack defense trees are used to show the interaction between potential attacks on a system and the system defenses. In this paper we present a formal semantic model for attack defense trees with sequential composition, allowing for the description of ...
Bryans, Jeremy +2 more
core +1 more source
This study investigates how CTCs survive varying shear stress during hematogenous metastasis. We uncover a self‐protection mechanism, by which non‐adherent CTCs adapt to high shearing milieu through accumulated cytoplasmic myosin‐mediated disruption of myosin‐actin binding, attenuating force transmission into chromatin to protect CTCs from shear ...
Cunyu Zhang +10 more
wiley +1 more source
A conversion‐resolved constitutive framework is developed for the hydrogen‐based direct reduction of iron oxide pellets. Effective reaction and transport timescales are inferred directly from measured trajectories and mapped against operating conditions, pellet architecture, and composition. The analysis reveals how late‐stage transport control emerges
Anurag Bajpai +3 more
wiley +1 more source
Synchronization of Analog Neuron Circuits With Digital Memristive Synapses: An Hybrid Approach
An hybrid circuit mimicking neural units coupled using memristive synapses is introduced. The analog neurons provide flexibility and robustness, and the digital memristive coupling guarantees the full reconfigurability of the interconnection. The onset of a synchronized spiking behavior in two circuits mimicking the Izhikevich neuron is discussed from ...
Lamberto Carnazza +3 more
wiley +1 more source
Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems [PDF]
Decision of whether a Boolean equation system has a solution is an NPC problem and finding a solution is NP hard. In this paper, we present a quantum algorithm to decide whether a Boolean equation system FS has a solution and compute one if FS does have ...
Chen, Yu-Ao, Gao, Xiao-Shan
core +1 more source
Maximizing Algebraic Connectivity of Constrained Graphs in Adversarial Environments
This paper aims to maximize algebraic connectivity of networks via topology design under the presence of constraints and an adversary. We are concerned with three problems.
bhattacharya +4 more
core +1 more source
Practical Algebraic Side-Channel Attacks Against ACORN [PDF]
The authenticated cipher ACORN is one of the two finalists of the CAESAR competition and is intended for lightweight applications. Because such use cases require protection against physical attacks, several works have been undertaken to achieve secure implementations. Although dedicated threshold and masked schemes have been proposed, no practical side-
Adomnicai, Alexandre +2 more
openaire +3 more sources

