Results 111 to 120 of about 136,963 (275)
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
At AES’00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis.
Jinkeon Kang +4 more
doaj +1 more source
Optimizing Fast Near Collision Attack on Grain Using Linear Programming
In 2018, an attack named fast-near-collision attack (FNCA) was proposed, which is an improved version of near-collision attack (NCA) on Grain-v1, one of the three hardware-oriented finalists of the eSTREAM project.
Senshan Pan, Yueping Wu, Liangmin Wang
doaj +1 more source
Horizontal Collision Correlation Attack on Elliptic Curves [PDF]
Elliptic curves based algorithms are nowadays widely spread among embedded systems. They indeed have the double advantage of providing efficient implementations with short certificates and of being relatively easy to secure against side-channel attacks.
Aurélie Bauer +3 more
openaire +1 more source
L-collision Attacks against Randomized MACs [PDF]
In order to avoid birthday attacks on message authentication schemes, it has been suggested that one add randomness to the scheme. One must be careful about how randomness is added, however. This paper shows that prefixing randomness to a message before running the message through an iterated MAC leads to an attack that takes only O (2(l+r)/3 + max{2l ...
openaire +1 more source
ABSTRACT This paper presents a comprehensive numerical analysis of magnetohydrodynamic (MHD) Casson nanofluid movement over a permeable, linearly stretching sheet, integrating the contributions of non‐uniform heat generation or absorption and chemical interaction.
Manoj Kumar Sahoo +3 more
wiley +1 more source
Comprehensive Analysis and Implementation of Isogeny-Based Hash Functions
This paper analyzes the security and performance of the isogeny-based hash functions. The isogeny-based hash function was first proposed by Charles, Goren, and Lauter, and is referred to as the CGL hash function.
Donghoe Heo +4 more
doaj +1 more source
ABSTRACT Agglomeration of bed materials during circulating fluidised bed (CFB) combustion or gasification of high‐alkali fuel is a practical challenge in industrial practice. This work investigates experimentally the effect of temperatures (700°C–900°C) and atmosphere (air equivalence ratios 1.61–0.53) on agglomeration in a lab‐scale bubbling fluidised
Zipeng Guo +4 more
wiley +1 more source
ABSTRACT Excessive water production in mature oil fields necessitates robust shut‐off treatments, yet conventional polymer gels often fail under high‐temperature and high‐salinity conditions. This study aims to enhance gel thermal stability and mechanical strength by incorporating selenium‐doped Ag/AgO–ZnO nanocomposites synthesized via a novel green ...
Fadhil F. Sead +8 more
wiley +1 more source
ABSTRACT Drilling fluids used in high‐performance well operations often struggle to maintain rheological stability, colloidal dispersion, and filtration control under harsh downhole conditions. This study engineered a multifunctional Fe3O4@Saponin/Cu(II) nanocomposite to address these challenges.
Kassem Al Attabi +9 more
wiley +1 more source
A Hybrid Semi‐Inverse Variational and Machine Learning Approach for the Schrödinger Equation
A hybrid semi‐inverse variational and machine‐learning framework is presented for solving the Schrödinger equation with complex quantum potentials. Physics‐based variational solutions generate high‐quality training data, enabling Random Forest and Neural Network models to deliver near‐perfect energy predictions.
Khalid Reggab +5 more
wiley +1 more source

