Results 61 to 70 of about 1,782,571 (254)

Capacitive versus Faradaic Microelectrodes for Extracellular Stimulation: A Fully Coupled FEM–Hodgkin–Huxley Study of Thresholds and Current Redistribution

open access: yesAdvanced Electronic Materials, EarlyView.
A fully coupled FEM–HH model shows that ideally capacitive microelectrodes can achieve lower charge‐density thresholds than Faradaic contacts under current‐controlled stimulation. The advantage stems from the dynamics of surface current density on capacitive interfaces, which redirects current beneath adherent neurons.
Aleksandar Opančar   +2 more
wiley   +1 more source

Novel extended multivariate public key cryptosystem

open access: yesTongxin xuebao, 2014
To resist linearization attack and differential attack effectively, a nonlinear invertible transformation based on“tame transformation” was constructed.
Shuai-ting QIAO, Yi-fa LI, Wen-bao HAN
doaj   +2 more sources

On the quantum security of high-dimensional RSA protocol

open access: yesJournal of Mathematical Cryptology
The idea of extending the classical RSA protocol using algebraic number fields was introduced by Takagi and Naito (Construction of RSA cryptosystem over the algebraic field using ideal theory and investigation of its security.
Rahmani Nour-eddine   +3 more
doaj   +1 more source

Algebraic Persistent Fault Analysis of SKINNY_64 Based on S_Box Decomposition

open access: yesEntropy, 2022
Algebraic persistent fault analysis (APFA), which combines algebraic analysis with persistent fault attacks, brings new challenges to the security of lightweight block ciphers and has received widespread attention since its introduction.
Xing Fang   +5 more
doaj   +1 more source

Interpretability and Representability of Commutative Algebra, Algebraic Topology, and Topological Spectral Theory for Real‐World Data

open access: yesAdvanced Intelligent Discovery, EarlyView.
This article investigates how persistent homology, persistent Laplacians, and persistent commutative algebra reveal complementary geometric, topological, and algebraic invariants or signatures of real‐world data. By analyzing shapes, synthetic complexes, fullerenes, and biomolecules, the article shows how these mathematical frameworks enhance ...
Yiming Ren, Guo‐Wei Wei
wiley   +1 more source

Algebraic Fault Attack Against SIMECK Cipher Based on Optimized Fault Location [PDF]

open access: yesJisuanji gongcheng, 2019
This paper proposes a algebraic fault attack method based on optimized fault location against SIMECK cipher.By analyzing encryption diffusion defect of the SIMECK round function and the failure cause,the deterministic propagation characteristics of ...
HUANG Changyang, WANG Tao, WANG Xiaohan, CHEN Qingchao, YIN Shizhuang
doaj   +1 more source

Improved Algebraic Cryptanalysis of the Reduced-Round Advanced Encryption Standard [PDF]

open access: yes, 2011
As we know Cryptology is divided into two parts: “Cryptography” and “Cryptanalysis”. Since block ciphers can be deployed in many different applications, so we focus on Advanced Encryption Standard (AES) which is the successor of Data Encryption Standard
Rezaeipour, Davood
core  

Resilient and Decentralized Control of Multi-level Cooperative Mobile Networks to Maintain Connectivity under Adversarial Environment

open access: yes, 2016
Network connectivity plays an important role in the information exchange between different agents in the multi-level networks. In this paper, we establish a game-theoretic framework to capture the uncoordinated nature of the decision-making at different ...
Chen, Juntao, Zhu, Quanyan
core   +1 more source

Algebraic Attacks on Summation Generators [PDF]

open access: yes, 2004
We apply the algebraic attacks on stream ciphers with memories to the summation generator. For a summation generator that uses n LFSRs, an algebraic equation relating the key stream bits and LFSR output bits can be made to be of degree less than or equal to \(^{\lceil\log_2 n \rceil}\) using ⌈log2 n ⌉ + 1 consecutive key stream bits. This is much lower
Dong Hoon Lee   +4 more
openaire   +1 more source

SiOx‐Based Probabilistic Bits Enabling Invertible Logic Gate for Cryptographic Applications

open access: yesAdvanced Intelligent Systems, EarlyView.
To enable lightweight hardware encryption and decryption, a Ti/SiOx/Ti threshold switching device is engineered to generate controllable stochastic oscillations. By tuning the input voltage, the device produces a programmable spike probability governed by intrinsic switching dynamics, enabling probabilistic bits that construct an invertible ...
Jihyun Kim, Hyeonsik Choi, Jiyong Woo
wiley   +1 more source

Home - About - Disclaimer - Privacy