Results 111 to 120 of about 215,935 (334)
One Password: An Encryption Scheme for Hiding Users' Register Information
In recent years, the attack which leverages register information (e.g. accounts and passwords) leaked from 3rd party applications to try other applications is popular and serious. We call this attack "database collision".
Zhao, Bo, Zhou, Yu
core
Collision Forgery Attack on the AES-OTR Algorithm under Quantum Computing [PDF]
Lipeng Chang+3 more
openalex +1 more source
Unveiling the Aging Effect at the Interface of N719 Dye‐Sensitized Solar Cells
Iodide is incorporated into the N719 layer through two mechanisms: the known ligand exchange of NCS with I and a second yet unknown mechanism which significantly blocks the charge regeneration process of the N719 dye contributing to the cell degradation.
Sunita G. Adhikari+3 more
wiley +1 more source
Cryptanalysis of 48-step RIPEMD-160
In this paper, we show how to theoretically compute the step differential probability of RIPEMD-160 under the condition that only one internal variable contains difference and the difference is a power of 2.
Gaoli Wang, Yanzhao Shen, Fukang Liu
doaj +1 more source
Security of signed ELGamal encryption [PDF]
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against the adaptive chosen ciphertext attack, in which an attacker can freely use
Jakobsson, Markus, Schnorr, Claus Peter
core
Rethinking Tag Collisions for Replay and Relay Attack Resistance in Backscatter Networks [PDF]
Hoorin Park, Wonjun Lee
openalex +1 more source
Nitrogen doping on Ru(0001) is investigated using ion implantation and annealing, tuning the distribution of graphitic (GN) and pyridinic (PN) nitrogen sites. STM, XPS, and DFT identified the structure and site distribution, and a thermodynamic phase diagram showed that GN is most stable at the Atop region, while PN preferred boundaries between FCC and
Buddhika S. A. Gedara+8 more
wiley +1 more source
Grayscale Image Authentication using Neural Hashing
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication.
Kutlu, Yakup, Yayık, Apdullah
core +2 more sources
Horizontal Collision Correlation Attack on Elliptic Curves [PDF]
Elliptic curves based algorithms are nowadays widely spread among embedded systems. They indeed have the double advantage of providing efficient implementations with short certificates and of being relatively easy to secure against side-channel attacks.
Éliane Jaulmes+3 more
openaire +2 more sources
This study presents microfabricated electrochemical sensors for detecting ultralow viral particles counts through evaporation‐enhanced redox cycling (E2RC). To achieve sub‐micrometer gap in interdigitated microelectrodes, a scalable, nanolithography‐free fabrication method is developed.
Pouya Soltan Khamsi+2 more
wiley +1 more source