Results 61 to 70 of about 1,782,571 (254)
A fully coupled FEM–HH model shows that ideally capacitive microelectrodes can achieve lower charge‐density thresholds than Faradaic contacts under current‐controlled stimulation. The advantage stems from the dynamics of surface current density on capacitive interfaces, which redirects current beneath adherent neurons.
Aleksandar Opančar +2 more
wiley +1 more source
Novel extended multivariate public key cryptosystem
To resist linearization attack and differential attack effectively, a nonlinear invertible transformation based on“tame transformation” was constructed.
Shuai-ting QIAO, Yi-fa LI, Wen-bao HAN
doaj +2 more sources
On the quantum security of high-dimensional RSA protocol
The idea of extending the classical RSA protocol using algebraic number fields was introduced by Takagi and Naito (Construction of RSA cryptosystem over the algebraic field using ideal theory and investigation of its security.
Rahmani Nour-eddine +3 more
doaj +1 more source
Algebraic Persistent Fault Analysis of SKINNY_64 Based on S_Box Decomposition
Algebraic persistent fault analysis (APFA), which combines algebraic analysis with persistent fault attacks, brings new challenges to the security of lightweight block ciphers and has received widespread attention since its introduction.
Xing Fang +5 more
doaj +1 more source
This article investigates how persistent homology, persistent Laplacians, and persistent commutative algebra reveal complementary geometric, topological, and algebraic invariants or signatures of real‐world data. By analyzing shapes, synthetic complexes, fullerenes, and biomolecules, the article shows how these mathematical frameworks enhance ...
Yiming Ren, Guo‐Wei Wei
wiley +1 more source
Algebraic Fault Attack Against SIMECK Cipher Based on Optimized Fault Location [PDF]
This paper proposes a algebraic fault attack method based on optimized fault location against SIMECK cipher.By analyzing encryption diffusion defect of the SIMECK round function and the failure cause,the deterministic propagation characteristics of ...
HUANG Changyang, WANG Tao, WANG Xiaohan, CHEN Qingchao, YIN Shizhuang
doaj +1 more source
Improved Algebraic Cryptanalysis of the Reduced-Round Advanced Encryption Standard [PDF]
As we know Cryptology is divided into two parts: “Cryptography” and “Cryptanalysis”. Since block ciphers can be deployed in many different applications, so we focus on Advanced Encryption Standard (AES) which is the successor of Data Encryption Standard
Rezaeipour, Davood
core
Network connectivity plays an important role in the information exchange between different agents in the multi-level networks. In this paper, we establish a game-theoretic framework to capture the uncoordinated nature of the decision-making at different ...
Chen, Juntao, Zhu, Quanyan
core +1 more source
Algebraic Attacks on Summation Generators [PDF]
We apply the algebraic attacks on stream ciphers with memories to the summation generator. For a summation generator that uses n LFSRs, an algebraic equation relating the key stream bits and LFSR output bits can be made to be of degree less than or equal to \(^{\lceil\log_2 n \rceil}\) using ⌈log2 n ⌉ + 1 consecutive key stream bits. This is much lower
Dong Hoon Lee +4 more
openaire +1 more source
SiOx‐Based Probabilistic Bits Enabling Invertible Logic Gate for Cryptographic Applications
To enable lightweight hardware encryption and decryption, a Ti/SiOx/Ti threshold switching device is engineered to generate controllable stochastic oscillations. By tuning the input voltage, the device produces a programmable spike probability governed by intrinsic switching dynamics, enabling probabilistic bits that construct an invertible ...
Jihyun Kim, Hyeonsik Choi, Jiyong Woo
wiley +1 more source

