Results 121 to 130 of about 215,935 (334)
Safety vs. Security: Attacking Avionic Systems with Humans in the Loop [PDF]
Many wireless communications systems found in aircraft lack standard security mechanisms, leaving them fundamentally vulnerable to attack. With affordable software-defined radios available, a novel threat has emerged, allowing a wide range of attackers to easily interfere with wireless avionic systems.
arxiv
Attacks on quantum key distribution protocols that employ non-ITS authentication
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin+25 more
core +1 more source
A novel MBOdCN S‐scheme heterojunction photocatalyst is fabricated using pristine Mg‐Bi2O3 and grayish g‐C3N4, where dynamic dual charge migration paths occur to accelerate exciton dissociation. This composite catalyst realizes high degradation efficiency of up to 99.56% of oxytetracycline (OTC) removal under optimized conditions. The material exhibits
Potlako J. Mafa+11 more
wiley +1 more source
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
At AES’00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis.
Jinkeon Kang+4 more
doaj +1 more source
On No-Sensing Adversarial Multi-player Multi-armed Bandits with Collision Communications [PDF]
We study the notoriously difficult no-sensing adversarial multi-player multi-armed bandits (MP-MAB) problem from a new perspective. Instead of focusing on the hardness of multiple players, we introduce a new dimension of hardness, called attackability.
arxiv
FreqD‐LBM simulates the oscillatory flow at the surface of a QCM‐D resonator in the presence of structured adsorbates. It derives shifts of frequency and bandwidth (equivalent to dissipation) on different overtones. Applications include rough surfaces, adsorbed rigid particles, adsorbed viscoelastic particles, spheres floating freely above the surface,
Diethelm Johannsmann+5 more
wiley +1 more source
Improved integral attack——random linear distinguish and key recovery attack
Based on the integral attack and collision attack of four rounds of AES, a random linear distinguish attack against four rounds of SP block ciphers was proposed, which took advantage of the non-uniformity of linear biases’ distribution between some ...
Shaoyu DU
doaj +2 more sources
Optimizing Fast Near Collision Attack on Grain Using Linear Programming
In 2018, an attack named fast-near-collision attack (FNCA) was proposed, which is an improved version of near-collision attack (NCA) on Grain-v1, one of the three hardware-oriented finalists of the eSTREAM project.
Senshan Pan, Yueping Wu, Liangmin Wang
doaj +1 more source
The ΔRMSF$\Delta {\rm RMSF}$ analysis reveals significant flexibility differences between free NS3 and the NS2B/NS3 complex, with notable deviations in specific regions. Key residues driving NS2B binding are identified, and the protonation state of catalytic serine affects oxyanion hole formation.
Jurica Novak+2 more
wiley +1 more source
Increasing half‐cycles intensifies turbulence due to enhanced vortex interactions and flow separation at the diverged‐outlets. Longer wavy ducts are shown to increase flow acceleration, resulting in greater output velocities and more turbulent‐kinetic‐energy production. Wave‐period plays a crucial role in determining turbulent intensity, with amplitude
I. L. Animasaun+2 more
wiley +1 more source