Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique [PDF]
In this work, we apply the sliced biclique cryptanalysis technique to show 8-round collision attack on a hash function H based on 4-branch, Type-2 Generalized Feistel Network (Type-2 GFN).
Donghoon Chang+3 more
core
Tuning Aggregation in Liquid‐Crystalline Squaraine Chromophores
A novel squaraine dye (SQ) forming columnar liquid crystal (LC) phase is synthesized, whose aggregate state can be tuned without disturbing the columnar structures. The liquid crystallization not only offers a rich spectrum and tuning method of optical property but also a novel path for the prescriptive functionalization of LC SQ materials.
Tianyi Tan+12 more
wiley +1 more source
Improved integral attack——random linear distinguish and key recovery attack
Based on the integral attack and collision attack of four rounds of AES, a random linear distinguish attack against four rounds of SP block ciphers was proposed, which took advantage of the non-uniformity of linear biases’ distribution between some ...
Shaoyu DU
doaj +2 more sources
This work presents a unique approach for fabricating homogeneously dispersed ZnS nanoparticles within an ultra‐thin (<40 nm) polymer matrix. The uniformity of dispersion is ensured through post‐polymerization substitution of Zn2⁺‐terminated side groups in surface‐grafted PMAA brushes. Due to the homogeneous distribution of semi‐conducting nanoparticles,
Wojciech Wieczorek+6 more
wiley +1 more source
Photocatalytic and Electrochemical Synthesis of Biofuel via Efficient Valorization of Biomass
This review highlights biomass and biofuel traits, exploring photocatalysis and electrocatalysis mechanisms and their synergistic technologies in biofuel production. It analyzes environmental and economic impacts of green catalytic processes, assesses current challenges, and outlines future research directions, condensing complex topics into a focused ...
Dalin Sun+9 more
wiley +1 more source
Comprehensive Analysis and Implementation of Isogeny-Based Hash Functions
This paper analyzes the security and performance of the isogeny-based hash functions. The isogeny-based hash function was first proposed by Charles, Goren, and Lauter, and is referred to as the CGL hash function.
Donghoe Heo+4 more
doaj +1 more source
Collision Attack on GRINDAHL [PDF]
Hash functions have been among the most scrutinized cryptographic primitives in the previous decade, mainly due to the cryptanalysis breakthroughs on MD-SHA family and the NIST SHA3 competition that followed.
Thomas Peyrin
core
Design of distributed guidance laws for multi-UAV cooperative attacking a moving target based on reducing surrounding area [PDF]
In this paper, two cooperative guidance laws based on the area around the target of multiattackers are designed to deal with the problem of cooperative encirclement or simultaneous attack in the case of known target acceleration and unknown target acceleration.
arxiv
Metal Sulfides as Potential Materials for Next Generation Lithium Ion Batteries: A Review
The flame spray pyrolysis (FSP) method demonstrates its superiority in fabricating metal sulfide‐based electrodes without inactive materials like organic binders or solvents. The particles are directly deposited and compressed onto the electrode surface, integrating into continuous production.
Muhammad Ali Martuza+2 more
wiley +1 more source
Distributed Optimal Guidance Laws for Multiple Unmanned Aerial Vehicles Attacking A Moving Target [PDF]
In this paper, two cooperative guidance laws based on two-point boundary value are designed to deal with the problem of cooperative encirclement and simultaneous attack under condition of both known target acceleration and unknown target acceleration.
arxiv