Results 41 to 50 of about 1,726,359 (308)
Related-Key Differential Cryptanalysis of 192-bit Key AES Variants [PDF]
A related-key differential cryptanalysis is applied to the 192-bit key variant of AES. Although any 4-round differential trail has at least 25 active bytes, one can construct 5-round related-key differential trail that has only 15 active bytes and break six rounds with 2106 plaintext/ciphertext pairs and complexity 2112.
Goce Jakimoski, Yvo Desmedt
openaire +1 more source
High-Speed Implementation of PRESENT on AVR Microcontroller
We propose the compact PRESENT on embedded processors. To obtain high-performance, PRESENT operations, including an add-round-key, a substitute layer and permutation layer operations are efficiently implemented on target embedded processors.
Hyeokdong Kwon +3 more
doaj +1 more source
Bit-oriented quantum public-key encryption
We propose a bit-oriented quantum public-key scheme which uses Boolean function as private-key and randomly changed pairs of quantum state and classical string as public-keys. Contrast to the typical classical public-key scheme, one private-key in our scheme corresponds to an exponential number of public-keys.
Wu, Chenmiao, Yang, Li
openaire +2 more sources
Graphene-based materials with large specific surface area, strong stability and easy adjustability attract considerable attention in the field of hydrogen storage; however, they suffer from poor hydrogen adsorption ability as direct physical adsorbents ...
Chaojie Liu +8 more
doaj +1 more source
Oblivious transfer based on single-qubit rotations
We present a bit-string quantum oblivious transfer protocol based on single-qubit rotations. Our protocol is built upon a previously proposed quantum public-key protocol and its practical security relies on the laws of Quantum Mechanics.
Mateus, P. +3 more
core +1 more source
Enhancing dichromate transport and reduction via electric fields induced by photocatalysis
Summary: Mass transport is a fundamental yet often overlooked factor in influencing adsorption and photocatalytic reaction kinetics. This study examines the role of mass transport using the model system of monoclinic bismuth vanadate (BiVO4) films and ...
Chen Chen +5 more
doaj +1 more source
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors [PDF]
We discuss how to recover RSA secret keys from noisy key bits with erasures and errors. There are two known algorithms recovering original secret keys from noisy keys. At Crypto 2009, Heninger and Shacham proposed a method for the case where an erroneous version of secret keys contains only erasures. Subsequently, Henecka et al.
Noboru Kunihiro +2 more
openaire +1 more source
ABSTRACT Background Despite their increased risk for functional impairment resulting from cancer and its treatments, few adolescents and young adults (AYAs) with a hematological malignancy receive the recommended or therapeutic dose of exercise per week during inpatient hospitalizations.
Jennifer A. Kelleher +8 more
wiley +1 more source
Organoids in pediatric cancer research
Organoid technology has revolutionized cancer research, yet its application in pediatric oncology remains limited. Recent advances have enabled the development of pediatric tumor organoids, offering new insights into disease biology, treatment response, and interactions with the tumor microenvironment.
Carla Ríos Arceo, Jarno Drost
wiley +1 more source
Security of quantum key distribution with multiphoton components
Most qubit-based quantum key distribution (QKD) protocols extract the secure key merely from single-photon component of the attenuated lasers. However, with the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) QKD protocol, the unconditionally secure key can be ...
Chen, Zeng-Bing +3 more
core +1 more source

