Results 51 to 60 of about 1,782,571 (254)

Improving Fast Algebraic Attacks [PDF]

open access: yes, 2004
An algebraic attack is a method for cryptanalysis which is based on finding and solving a system of nonlinear equations. Recently, algebraic attacks where found helpful in cryptanalysing LFSR-based stream ciphers. The efficiency of these attacks greatly depends on the degree of the nonlinear equations.
openaire   +2 more sources

Physical Origin of Temperature Induced Activation Energy Switching in Electrically Conductive Cement

open access: yesAdvanced Science, EarlyView.
The temperature‐induced Arrhenius activation energy switching phenomenon of electrical conduction in electrically conductive cement originates from structural degradation within the biphasic ionic‐electronic conduction architecture and shows percolation‐governed characteristics: pore network opening dominates the low‐percolation regime with downward ...
Jiacheng Zhang   +7 more
wiley   +1 more source

New directions in cryptanalysis of block ciphers. [PDF]

open access: yes, 2009
The algebraic expression of the Advanced Encryption Standard (AES) RIJNDAEL S-box involved only 9 terms. The selected mapping for RIJNDAEL S-box has a simple algebraic expression.
Md Said, Mohamad Rushdan   +1 more
core  

Attack Defense Trees with Sequential Conjunction [PDF]

open access: yes, 2019
Attack defense trees are used to show the interaction between potential attacks on a system and the system defenses. In this paper we present a formal semantic model for attack defense trees with sequential composition, allowing for the description of ...
Bryans, Jeremy   +2 more
core   +1 more source

Mechanoadaptation via Myosin Cytoplasmic Redistribution Protects Circulating Tumor Cells From Shear‐induced Death During Hematogenous Dissemination

open access: yesAdvanced Science, EarlyView.
This study investigates how CTCs survive varying shear stress during hematogenous metastasis. We uncover a self‐protection mechanism, by which non‐adherent CTCs adapt to high shearing milieu through accumulated cytoplasmic myosin‐mediated disruption of myosin‐actin binding, attenuating force transmission into chromatin to protect CTCs from shear ...
Cunyu Zhang   +10 more
wiley   +1 more source

Physics‐Constrained Constitutive Learning of Rate‐Limiting Timescales for Efficient Hydrogen‐Based Direct Reduction for Green Steel Making

open access: yesAdvanced Science, EarlyView.
A conversion‐resolved constitutive framework is developed for the hydrogen‐based direct reduction of iron oxide pellets. Effective reaction and transport timescales are inferred directly from measured trajectories and mapped against operating conditions, pellet architecture, and composition. The analysis reveals how late‐stage transport control emerges
Anurag Bajpai   +3 more
wiley   +1 more source

Synchronization of Analog Neuron Circuits With Digital Memristive Synapses: An Hybrid Approach

open access: yesAdvanced Electronic Materials, EarlyView.
An hybrid circuit mimicking neural units coupled using memristive synapses is introduced. The analog neurons provide flexibility and robustness, and the digital memristive coupling guarantees the full reconfigurability of the interconnection. The onset of a synchronized spiking behavior in two circuits mimicking the Izhikevich neuron is discussed from ...
Lamberto Carnazza   +3 more
wiley   +1 more source

Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems [PDF]

open access: yes, 2018
Decision of whether a Boolean equation system has a solution is an NPC problem and finding a solution is NP hard. In this paper, we present a quantum algorithm to decide whether a Boolean equation system FS has a solution and compute one if FS does have ...
Chen, Yu-Ao, Gao, Xiao-Shan
core   +1 more source

Maximizing Algebraic Connectivity of Constrained Graphs in Adversarial Environments

open access: yes, 2017
This paper aims to maximize algebraic connectivity of networks via topology design under the presence of constraints and an adversary. We are concerned with three problems.
bhattacharya   +4 more
core   +1 more source

Practical Algebraic Side-Channel Attacks Against ACORN [PDF]

open access: yes, 2019
The authenticated cipher ACORN is one of the two finalists of the CAESAR competition and is intended for lightweight applications. Because such use cases require protection against physical attacks, several works have been undertaken to achieve secure implementations. Although dedicated threshold and masked schemes have been proposed, no practical side-
Adomnicai, Alexandre   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy