Results 101 to 110 of about 215,935 (334)
Research on the multi-message modification techniques on MD5
According to research on the message modification techniques presented by Wang Xiaoyun et al and the advanced message modification techniques proposed by Yu Sasaki et al, the multi-message modification techniques were founded to not be always able to ...
CHEN Shi-wei, JIN Chen-hui
doaj
Study of Solid Particle Erosion on Helicopter Rotor Blades Surfaces
In this study, titanium alloy (Ti-4Al-1.5Mn), magnesium alloy (Mg-Li9-A3-Zn3), or aluminum alloy (Al7075-T6) were used to construct the shell model of helicopter rotor blade to study the solid particle erosion of helicopter rotor blades.
Xupeng Bai+4 more
doaj +1 more source
On the Design of Secure and Fast Double Block Length Hash Functions [PDF]
In this work the security of the rate-1 double block length hash functions, which based on a block cipher with a block length of n-bit and a key length of 2n-bit, is reconsidered.
Chen, Kefei, Gong, Z., Lai, X.J.
core +3 more sources
On the optimality of individual entangling-probe attacks against BB84 quantum key distribution
It is shown that an existing method to study ideal individual attacks on the BB84 QKD protocol using error discard can be adapted to reconciliation with error correction, and that an optimal attack can be explicitly found.
Bettelli, S.+3 more
core +1 more source
Controlled Formation of Skyrmion Bags
This work demonstrates stabilization of complex magnetic skyrmion bags in ferromagnetic thin films through precisely engineered anisotropy defects using ion irradiation. The researchers achieve controlled field‐ and laser‐induced generation of skyrmionia, target skyrmions, and higher‐order skyrmion bags at room temperature. This reliable platform opens
Lisa‐Marie Kern+20 more
wiley +1 more source
Classically in combinatorics on words one studies unavoidable regularities that appear in sufficiently long strings of symbols over a fixed size alphabet.
A. Restivo+16 more
core +2 more sources
A second pre-image attack and a collision attack to cryptographic hash function lux
Cryptography is a science that provides the security of information in communication. One of the most important sub-branches of cryptography is the hash functions. Hash functions are known as the digital fingerprints. Following the recent attacks on the widely used hash functions MD5 and SHA-1 and the increase in computational power, the need for a new
SULAK, Fatih+4 more
openaire +4 more sources
Fault Attack of SMS4 Based on Internal Collisions
Abstract A fault attack of SMS4 based on internal collision is proposed. The method assumes that the attacker can attack under the condition of selecting plaintext, and adopts the byte-oriented random fault model to successfully recover the original key by injecting the fault in the first few rounds of the encryption algorithm of the ...
Fang Luo, Renjie Zhu, Qingyu Ou
openaire +2 more sources
Permanent Plasma Surface Functionalization of Internal Surface Areas
With applications in various fields including biomedical sciences, textiles, or filter industry, stable functionalization of porous membranes is indispensable. Plasma‐activated species with specific reactivities infiltrate porous substrates at different penetration depths due to their distinct energies and diffusivities.
Dirk Hegemann+4 more
wiley +1 more source
Quantum Random Oracle Model for Quantum Public-Key Encryption
Random oracle model is a general security analysis tool for rigorous security proof and effective cryptographic protocol design. In the quantum world, the attempts of constructing a quantum random oracle (QRO) have been made, such as quantum-accessible ...
Tao Shang, Ranyiliu Chen, Qi Lei
doaj +1 more source