Results 281 to 290 of about 1,585,996 (337)
Bio-mimicking DNA fingerprint profiling for HLS watermarking to counter hardware IP piracy. [PDF]
Sengupta A+3 more
europepmc +1 more source
Sensitive and Spectral Interference-Free Determination of Rhodium by Photochemical Vapor Generation Inductively Coupled Plasma Mass Spectrometry. [PDF]
Hašlová K, Musil S.
europepmc +1 more source
Applying the Sabatier Principle to Decipher the Surface-Structure-Dependent Catalysis of Different Starch Granules by Pullulanase. [PDF]
Wang Y+6 more
europepmc +1 more source
Numerical Analysis of Cavitation Erosion in 316L Steel with CrN PVD Coating. [PDF]
Maurin A.
europepmc +1 more source
A kinetic model of antigen-dependent IgG oligomerization and complement binding
Strasser J+7 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
IEEE Transactions on Information Forensics and Security, 2019
Key enumeration schemes are used to post-process the scores given by side channel distinguishers and enumerate the key candidates from the most possible one to the least possible one, which can be regarded as optimal tools of key search.
Changhai Ou+3 more
semanticscholar +3 more sources
Key enumeration schemes are used to post-process the scores given by side channel distinguishers and enumerate the key candidates from the most possible one to the least possible one, which can be regarded as optimal tools of key search.
Changhai Ou+3 more
semanticscholar +3 more sources
Efficient Collision Attack Frameworks for RIPEMD-160
IACR Cryptology ePrint Archive, 2019RIPEMD-160 is an ISO/IEC standard and has been applied to generate the Bitcoin address with SHA-256. Due to the complex dual-stream structure, the first collision attack on reduced RIPEMD-160 presented by Liu, Mendel and Wang at Asiacrypt 2017 only reaches 30 steps, having a time complexity of \(2^{70}\).
F. Liu
semanticscholar +4 more sources
Related-Key Collision Attack of AES_256
2010 International Symposium on Intelligence Information Processing and Trusted Computing, 2010This paper utilized the arrangement points of AES_256 key, analyzed the difference features of AES_256, and found a method of collision attack. This paper also made use of connection differential features and collision method of AES_256 to analyze the 72
Zhihua Hu, Zhongping Qin
semanticscholar +3 more sources