Results 41 to 50 of about 1,726,359 (308)

Related-Key Differential Cryptanalysis of 192-bit Key AES Variants [PDF]

open access: yes, 2004
A related-key differential cryptanalysis is applied to the 192-bit key variant of AES. Although any 4-round differential trail has at least 25 active bytes, one can construct 5-round related-key differential trail that has only 15 active bytes and break six rounds with 2106 plaintext/ciphertext pairs and complexity 2112.
Goce Jakimoski, Yvo Desmedt
openaire   +1 more source

High-Speed Implementation of PRESENT on AVR Microcontroller

open access: yesMathematics, 2021
We propose the compact PRESENT on embedded processors. To obtain high-performance, PRESENT operations, including an add-round-key, a substitute layer and permutation layer operations are efficiently implemented on target embedded processors.
Hyeokdong Kwon   +3 more
doaj   +1 more source

Bit-oriented quantum public-key encryption

open access: yes, 2015
We propose a bit-oriented quantum public-key scheme which uses Boolean function as private-key and randomly changed pairs of quantum state and classical string as public-keys. Contrast to the typical classical public-key scheme, one private-key in our scheme corresponds to an exponential number of public-keys.
Wu, Chenmiao, Yang, Li
openaire   +2 more sources

One-step synthesis of fluorine-functionalized intercalated graphene with adjustable layer spacing for both enhanced physical and chemical hydrogen storage

open access: yesMaterials Today Catalysis
Graphene-based materials with large specific surface area, strong stability and easy adjustability attract considerable attention in the field of hydrogen storage; however, they suffer from poor hydrogen adsorption ability as direct physical adsorbents ...
Chaojie Liu   +8 more
doaj   +1 more source

Oblivious transfer based on single-qubit rotations

open access: yes, 2017
We present a bit-string quantum oblivious transfer protocol based on single-qubit rotations. Our protocol is built upon a previously proposed quantum public-key protocol and its practical security relies on the laws of Quantum Mechanics.
Mateus, P.   +3 more
core   +1 more source

Enhancing dichromate transport and reduction via electric fields induced by photocatalysis

open access: yesiScience
Summary: Mass transport is a fundamental yet often overlooked factor in influencing adsorption and photocatalytic reaction kinetics. This study examines the role of mass transport using the model system of monoclinic bismuth vanadate (BiVO4) films and ...
Chen Chen   +5 more
doaj   +1 more source

Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors [PDF]

open access: yesIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013
We discuss how to recover RSA secret keys from noisy key bits with erasures and errors. There are two known algorithms recovering original secret keys from noisy keys. At Crypto 2009, Heninger and Shacham proposed a method for the case where an erroneous version of secret keys contains only erasures. Subsequently, Henecka et al.
Noboru Kunihiro   +2 more
openaire   +1 more source

Patient‐Level Barriers and Facilitators to Inpatient Physical Therapy in Adolescents and Young Adults With a Hematological Malignancy: A Qualitative Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Despite their increased risk for functional impairment resulting from cancer and its treatments, few adolescents and young adults (AYAs) with a hematological malignancy receive the recommended or therapeutic dose of exercise per week during inpatient hospitalizations.
Jennifer A. Kelleher   +8 more
wiley   +1 more source

Organoids in pediatric cancer research

open access: yesFEBS Letters, EarlyView.
Organoid technology has revolutionized cancer research, yet its application in pediatric oncology remains limited. Recent advances have enabled the development of pediatric tumor organoids, offering new insights into disease biology, treatment response, and interactions with the tumor microenvironment.
Carla Ríos Arceo, Jarno Drost
wiley   +1 more source

Security of quantum key distribution with multiphoton components

open access: yes, 2016
Most qubit-based quantum key distribution (QKD) protocols extract the secure key merely from single-photon component of the attenuated lasers. However, with the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) QKD protocol, the unconditionally secure key can be ...
Chen, Zeng-Bing   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy