Results 111 to 120 of about 133,184 (295)

Can NSEC5 be practical for DNSSEC deployments? [PDF]

open access: yes, 2017
NSEC5 is proposed modification to DNSSEC that simultaneously guarantees two security properties: (1) privacy against offline zone enumeration, and (2) integrity of zone contents, even if an adversary compromises the authoritative nameserver responsible ...
Goldberg, Sharon   +6 more
core  

Advancing Clinical Medicine with Raman Spectroscopy: Current Trends and Future Perspectives

open access: yesAdvanced Photonics Research, EarlyView.
Raman spectroscopy and microscopy may become excellent tools in clinical medicine, including hematology, oncology, infectious diseases, neurology, gastroenterology, reproductive medicine, rheumatology, and cardiovascular research. However, many challenges such as signal interference, standardization issues, and limited clinical application need to be ...
Jiří Bufka   +5 more
wiley   +1 more source

Collision‐Resilient Winged Drones Enabled by Tensegrity Structures

open access: yesAdvanced Robotics Research, EarlyView.
Based on structures of birds such as the woodpeck, this article presents the collision‐resilient aerial robot, SWIFT. SWIFT leverages tensegrity structures in the fuselage and wings which allow it to undergo large deformations in a crash, without sustaining damage. Experiments show that SWIFT can reduce impact forces by 70% over conventional structures.
Omar Aloui   +5 more
wiley   +1 more source

Improved integral attack——random linear distinguish and key recovery attack

open access: yesTongxin xuebao, 2023
Based on the integral attack and collision attack of four rounds of AES, a random linear distinguish attack against four rounds of SP block ciphers was proposed, which took advantage of the non-uniformity of linear biases’ distribution between some ...
Shaoyu DU
doaj   +2 more sources

A Formula That Generates Hash Collisions

open access: yes, 2018
We present an explicit formula that produces hash collisions for the Merkle-Damg{\aa}rd construction. The formula works for arbitrary choice of message block and irrespective of the standardized constants used in hash functions, although some padding ...
Brockmann, Andrew
core  

Fabrication of Superinsulating Poly(Urethane‐Isocyanurate) Aerogels Derived from Upcycled Polycarbonate

open access: yesAdvanced Sustainable Systems, EarlyView.
Bisphenol‐A polycarbonate is upcycled via a simple one‐pot reaction into an aromatic Mannich polyol, which serves as a precursor for fabricating poly(urethane‐isocyanurate) (PUR‐PIR) aerogels. PUR‐PIR aerogels, prepared with different isocyanate indices, exhibit high porosities, high specific surface areas, ultralow thermal conductivity, and excellent ...
Ivona Glišić   +5 more
wiley   +1 more source

A Mass Spectrometry Approach Reveals Fatty Acid Isomerism in Tomato Cold Tolerance

open access: yesAdvanced Science, EarlyView.
An enhanced mass spectrometry approach reveals fatty acids (FAs) and FA isomers that are critical for tomato cold tolerance. Applying specific FA isomers can partially rescue cold sensitivity in tomato mutant plants, highlighting the importance of FA isomers in plant cold stress adaptation.
Leelyn Chong   +7 more
wiley   +1 more source

Comprehensive Analysis and Implementation of Isogeny-Based Hash Functions

open access: yesIEEE Access
This paper analyzes the security and performance of the isogeny-based hash functions. The isogeny-based hash function was first proposed by Charles, Goren, and Lauter, and is referred to as the CGL hash function.
Donghoe Heo   +4 more
doaj   +1 more source

Collision Attacks Against CAESAR Candidates

open access: yes, 2015
In this paper we study authenticated encryption algorithms inspired by the OCB mode Offset Codebook. These algorithms use secret offsets masks derived from a whitening key to turn a block cipher into a tweakable block cipher, following the XE or XEX construction. OCB has a security proof upi¾?to $$2^{n/2}$$ queries, and a matching forgery attack was
Fuhr, Thomas   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy