Results 101 to 110 of about 133,184 (295)
Rethinking Tag Collisions for Replay and Relay Attack Resistance in Backscatter Networks [PDF]
Hoorin Park, Wonjun Lee
openalex +1 more source
Horizontal Collision Correlation Attack on Elliptic Curves [PDF]
Elliptic curves based algorithms are nowadays widely spread among embedded systems. They indeed have the double advantage of providing efficient implementations with short certificates and of being relatively easy to secure against side-channel attacks.
Éliane Jaulmes +3 more
openaire +2 more sources
This study demonstrates how implantation‐induced defects in CrN thin films enable controlled tuning of electrical transport from metallic to semiconductor‐like behavior while preserving thermal conductivity. Through cumulative argon implantation, defect landscapes are engineered to manipulate carrier mobility and conduction mechanisms, revealing key ...
Hugo Bouteiller +8 more
wiley +1 more source
Quantum Random Oracle Model for Quantum Public-Key Encryption
Random oracle model is a general security analysis tool for rigorous security proof and effective cryptographic protocol design. In the quantum world, the attempts of constructing a quantum random oracle (QRO) have been made, such as quantum-accessible ...
Tao Shang, Ranyiliu Chen, Qi Lei
doaj +1 more source
This study explores overlapping charge transport mechanisms in TADF materials and identifies spin‐orbit coupling as the dominant mechanism for triplet‐to‐singlet transition in carbazole‐based cyanoarene emitters. Computational investigations reveal a second spin‐orbit‐coupling‐mediated reverse intersystem crossing pathway, significantly enhancing the ...
Annika Morgenstern +13 more
wiley +1 more source
Breaking and making quantum money: toward a new quantum cryptographic protocol [PDF]
Public-key quantum money is a cryptographic protocol in which a bank can create quantum states which anyone can verify but no one except possibly the bank can clone or forge.
Aaronson, Scott +6 more
core +1 more source
Preserving Both Privacy and Utility in Network Trace Anonymization
As network security monitoring grows more sophisticated, there is an increasing need for outsourcing such tasks to third-party analysts. However, organizations are usually reluctant to share their network traces due to privacy concerns over sensitive ...
Adam +22 more
core +1 more source
Electron acceleration using multipetawatt femtosecond lasers and subcritical density plasmas achieves a maximum charge of 245 nC, with an injection rate of up to 100 nC per picosecond. The charge variation with plasma density, initially increasing and then decreasing, arises from the competition between the injection of multiple plasma waves and laser ...
Xi‐Chen Hu +9 more
wiley +1 more source
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
At AES’00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis.
Jinkeon Kang +4 more
doaj +1 more source
Optimizing Fast Near Collision Attack on Grain Using Linear Programming
In 2018, an attack named fast-near-collision attack (FNCA) was proposed, which is an improved version of near-collision attack (NCA) on Grain-v1, one of the three hardware-oriented finalists of the eSTREAM project.
Senshan Pan, Yueping Wu, Liangmin Wang
doaj +1 more source

