Results 111 to 120 of about 215,935 (334)

One Password: An Encryption Scheme for Hiding Users' Register Information

open access: yes, 2017
In recent years, the attack which leverages register information (e.g. accounts and passwords) leaked from 3rd party applications to try other applications is popular and serious. We call this attack "database collision".
Zhao, Bo, Zhou, Yu
core  

Collision Forgery Attack on the AES-OTR Algorithm under Quantum Computing [PDF]

open access: gold, 2022
Lipeng Chang   +3 more
openalex   +1 more source

Unveiling the Aging Effect at the Interface of N719 Dye‐Sensitized Solar Cells

open access: yesAdvanced Materials Interfaces, EarlyView.
Iodide is incorporated into the N719 layer through two mechanisms: the known ligand exchange of NCS with I and a second yet unknown mechanism which significantly blocks the charge regeneration process of the N719 dye contributing to the cell degradation.
Sunita G. Adhikari   +3 more
wiley   +1 more source

Cryptanalysis of 48-step RIPEMD-160

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In this paper, we show how to theoretically compute the step differential probability of RIPEMD-160 under the condition that only one internal variable contains difference and the difference is a power of 2.
Gaoli Wang, Yanzhao Shen, Fukang Liu
doaj   +1 more source

Security of signed ELGamal encryption [PDF]

open access: yes, 2005
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against the adaptive chosen ciphertext attack, in which an attacker can freely use
Jakobsson, Markus, Schnorr, Claus Peter
core  

Thermodynamic Stability and Site‐Specific Distribution of Graphitic and Pyridinic Nitrogen in Graphene Moiré on Ru(0001)

open access: yesAdvanced Materials Interfaces, EarlyView.
Nitrogen doping on Ru(0001) is investigated using ion implantation and annealing, tuning the distribution of graphitic (GN) and pyridinic (PN) nitrogen sites. STM, XPS, and DFT identified the structure and site distribution, and a thermodynamic phase diagram showed that GN is most stable at the Atop region, while PN preferred boundaries between FCC and
Buddhika S. A. Gedara   +8 more
wiley   +1 more source

Grayscale Image Authentication using Neural Hashing

open access: yes, 2016
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication.
Kutlu, Yakup, Yayık, Apdullah
core   +2 more sources

Horizontal Collision Correlation Attack on Elliptic Curves [PDF]

open access: yes, 2014
Elliptic curves based algorithms are nowadays widely spread among embedded systems. They indeed have the double advantage of providing efficient implementations with short certificates and of being relatively easy to secure against side-channel attacks.
Éliane Jaulmes   +3 more
openaire   +2 more sources

Evaporation‐Enhanced Redox Cycling for Rapid Detection of Attomolar SARS‐CoV‐2 Virions Using Nanolithography‐Free Electrochemical Devices

open access: yesAdvanced Materials Technologies, EarlyView.
This study presents microfabricated electrochemical sensors for detecting ultralow viral particles counts through evaporation‐enhanced redox cycling (E2RC). To achieve sub‐micrometer gap in interdigitated microelectrodes, a scalable, nanolithography‐free fabrication method is developed.
Pouya Soltan Khamsi   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy