Results 41 to 50 of about 136,963 (275)
Analysis of DoS Attacks at MAC Layer in Mobile Adhoc Networks [PDF]
—Wireless network security has received tremendous attention due to the vulnerabilities exposed in the open communication medium. The most common wireless Medium Access Control (MAC) protocol is IEEE 802.11, which assumes all the nodes in the network are
Alocious, Chaminda +2 more
core +2 more sources
In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of applications such as ensuring the authentication and integrity of the data, in forensic investigation ...
Darshana Upadhyay +3 more
doaj +1 more source
Formal Computational Unlinkability Proofs of RFID Protocols [PDF]
We set up a framework for the formal proofs of RFID protocols in the computational model. We rely on the so-called computationally complete symbolic attacker model. Our contributions are: i) To design (and prove sound) axioms reflecting the properties of
Comon, Hubert, Koutsos, Adrien
core +1 more source
Boole is a hash function designed by Gregory Rose and was submitted to the NIST Hash competition. It is a stream cipher based hash function which produces digests up to 512 bits. Different variants exist, namely Boole16, Boole32 and Boole64 where the number refers to word size in bits. Boole64 is considered as the official submission.
Mendel, Florian +2 more
openaire +2 more sources
Numerical Modeling of Tank Cars Carrying Hazardous Materials With and Without Composite Metal Foam
Large‐scale puncture models consisting of hazardous materials (HAZMATs) tank car with protective steel–steel composite metal foam (S–S CMF) are solved numerically. Tank car plate with added 10.91–13.33 mm thick S–S CMF layer does not puncture. Protective S–S CMF absorbs impact energy, reduces plate deformation, and prevents shear bands formation ...
Aman Kaushik, Afsaneh Rabiei
wiley +1 more source
A Meaningful MD5 Hash Collision Attack [PDF]
It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that would generate two different messages that gives the same MD5 sum. Many conditions need to be satisfied to attain this collision.
Kashyap, Narayana D.
core +1 more source
Fatigue Crack Initiation and Growth in Nanocrystalline Ni at Multiple Length‐Scales
Overview of miniaturized in situ SEM fatigue setup and resultant fatigue crack growth data for nanocrystalline Ni. The presented study focuses on the analysis of fatigue crack growth rate (FCGR) in focused ion beam‐notched microcantilevers prepared from nanocrystalline (NC) Ni as a model material.
Igor Moravcik +7 more
wiley +1 more source
(Quantum) Collision Attacks on Reduced Simpira v2
Simpira v2 is an AES-based permutation proposed by Gueron and Mouha at ASIACRYPT 2016. In this paper, we build an improved MILP model to count the differential and linear active Sboxes for Simpira v2, which achieves tighter bounds of the minimum number ...
Boyu Ni +3 more
doaj +1 more source
Covalent organic frameworks (COFs) with metals have been recognized as versatile platforms for photocatalytic CO2 reduction (CO2PRR). Herein, an overview of metal integration strategies for COFs is systematically summarized. Regulatory mechanisms and structure–activity relationships between metal integration and COF‐based CO2PRR are emphasized.
Jie He +5 more
wiley +1 more source
On the Gold Standard for Security of Universal Steganography [PDF]
While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about its public-key counterpart resist persistent attempts to solve them.
A Kiayias +30 more
core +2 more sources

