SAT-Based Space Partitioning and Applications to Ascon-Hash256 Cryptanalysis
We introduce an efficient SAT-based space partitioning technique that enables systematic exploration of large search spaces in cryptanalysis. The approach divides complex search spaces into manageable subsets through combinatorial necklace generation ...
Guozhen Liu +4 more
doaj +1 more source
Attacks on quantum key distribution protocols that employ non-ITS authentication
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin +25 more
core +1 more source
Adaptive Twisting Metamaterials
This work introduces torque‐controlled twisting metamaterials as a transformative platform for adaptive crashworthiness. By combining multiscale predictive modeling with experimental validation on additively manufactured gyroids, it demonstrates tunable stiffness, collapse stress, and energy absorption.
Mattia Utzeri +6 more
wiley +1 more source
On the optimality of individual entangling-probe attacks against BB84 quantum key distribution
It is shown that an existing method to study ideal individual attacks on the BB84 QKD protocol using error discard can be adapted to reconciliation with error correction, and that an optimal attack can be explicitly found.
Bettelli, S. +3 more
core +1 more source
Recent Advances on Thermochromic Inks for Security Applications
Thermochromic security inks have garnered interest in recent years as security elements for authentication, information encryption, and anti‐counterfeiting. This review outlines different types of thermochromic materials, how they have been developed as functional inks, and how advancements in property enhancement, sustainability, and printing ...
Duarte B. Oliveira +5 more
wiley +1 more source
Numerical Calculation of Aerodynamic Characteristics of Low-Speed Aircraft under Heavy Rainfall Conditions [PDF]
Aiming at the aerodynamic characteristics of a low-speed aircraft in a rainstorm environment, an adapted numerical computation scheme is constructed based on the computational fluid dynamics method, taking into account the continuous-phase control ...
Yuan Peijun, Chang Sijiang, Dai Yuewei, Zhang Jialiang
doaj +1 more source
Breaking and making quantum money: toward a new quantum cryptographic protocol [PDF]
Public-key quantum money is a cryptographic protocol in which a bank can create quantum states which anyone can verify but no one except possibly the bank can clone or forge.
Aaronson, Scott +6 more
core +1 more source
Collision‐Resilient Winged Drones Enabled by Tensegrity Structures
Based on structures of birds such as the woodpeck, this article presents the collision‐resilient aerial robot, SWIFT. SWIFT leverages tensegrity structures in the fuselage and wings which allow it to undergo large deformations in a crash, without sustaining damage. Experiments show that SWIFT can reduce impact forces by 70% over conventional structures.
Omar Aloui +5 more
wiley +1 more source
NMPC-Based Cooperative Strategy to Lure Two Attackers Into Collision by Two Targets [PDF]
Amith Manoharan, P. B. Sujit
openalex +1 more source
TreeSpider: In‐Canopy Exploration With Tether‐Based Aerial Modular Arms
A tethered drone with perching arms and a 360° ring enables unprecedented maneuverability within dense forest canopies. By dynamically adjusting tether length and decoupling pitch from the frame, it navigates between branches, senses multiple trees, and interacts physically with foliage.
Luca Romanello +7 more
wiley +1 more source

