Results 101 to 110 of about 211,629 (261)

Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique [PDF]

open access: yes, 2015
In this work, we apply the sliced biclique cryptanalysis technique to show 8-round collision attack on a hash function H based on 4-branch, Type-2 Generalized Feistel Network (Type-2 GFN).
Donghoon Chang   +3 more
core  

Tuning Aggregation in Liquid‐Crystalline Squaraine Chromophores

open access: yesAdvanced Science, EarlyView.
A novel squaraine dye (SQ) forming columnar liquid crystal (LC) phase is synthesized, whose aggregate state can be tuned without disturbing the columnar structures. The liquid crystallization not only offers a rich spectrum and tuning method of optical property but also a novel path for the prescriptive functionalization of LC SQ materials.
Tianyi Tan   +12 more
wiley   +1 more source

Improved integral attack——random linear distinguish and key recovery attack

open access: yesTongxin xuebao, 2023
Based on the integral attack and collision attack of four rounds of AES, a random linear distinguish attack against four rounds of SP block ciphers was proposed, which took advantage of the non-uniformity of linear biases’ distribution between some ...
Shaoyu DU
doaj   +2 more sources

Ultrathin High‐Efficiency Zener Diode Fabricated Using Organized ZnS Nanoparticles in Surface‐Grafted Poly(methacrylic acid) Matrix

open access: yesAdvanced Electronic Materials, EarlyView.
This work presents a unique approach for fabricating homogeneously dispersed ZnS nanoparticles within an ultra‐thin (<40 nm) polymer matrix. The uniformity of dispersion is ensured through post‐polymerization substitution of Zn2⁺‐terminated side groups in surface‐grafted PMAA brushes. Due to the homogeneous distribution of semi‐conducting nanoparticles,
Wojciech Wieczorek   +6 more
wiley   +1 more source

Photocatalytic and Electrochemical Synthesis of Biofuel via Efficient Valorization of Biomass

open access: yesAdvanced Energy Materials, EarlyView.
This review highlights biomass and biofuel traits, exploring photocatalysis and electrocatalysis mechanisms and their synergistic technologies in biofuel production. It analyzes environmental and economic impacts of green catalytic processes, assesses current challenges, and outlines future research directions, condensing complex topics into a focused ...
Dalin Sun   +9 more
wiley   +1 more source

Comprehensive Analysis and Implementation of Isogeny-Based Hash Functions

open access: yesIEEE Access
This paper analyzes the security and performance of the isogeny-based hash functions. The isogeny-based hash function was first proposed by Charles, Goren, and Lauter, and is referred to as the CGL hash function.
Donghoe Heo   +4 more
doaj   +1 more source

Collision Attack on GRINDAHL [PDF]

open access: yes, 2016
Hash functions have been among the most scrutinized cryptographic primitives in the previous decade, mainly due to the cryptanalysis breakthroughs on MD-SHA family and the NIST SHA3 competition that followed.
Thomas Peyrin
core  

Design of distributed guidance laws for multi-UAV cooperative attacking a moving target based on reducing surrounding area [PDF]

open access: yesarXiv, 2019
In this paper, two cooperative guidance laws based on the area around the target of multiattackers are designed to deal with the problem of cooperative encirclement or simultaneous attack in the case of known target acceleration and unknown target acceleration.
arxiv  

Metal Sulfides as Potential Materials for Next Generation Lithium Ion Batteries: A Review

open access: yesAdvanced Energy and Sustainability Research, EarlyView.
The flame spray pyrolysis (FSP) method demonstrates its superiority in fabricating metal sulfide‐based electrodes without inactive materials like organic binders or solvents. The particles are directly deposited and compressed onto the electrode surface, integrating into continuous production.
Muhammad Ali Martuza   +2 more
wiley   +1 more source

Distributed Optimal Guidance Laws for Multiple Unmanned Aerial Vehicles Attacking A Moving Target [PDF]

open access: yesarXiv, 2019
In this paper, two cooperative guidance laws based on two-point boundary value are designed to deal with the problem of cooperative encirclement and simultaneous attack under condition of both known target acceleration and unknown target acceleration.
arxiv  

Home - About - Disclaimer - Privacy