Results 51 to 60 of about 211,629 (261)

New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160

open access: yesIACR Transactions on Symmetric Cryptology, 2019
RIPEMD-160 is a hash function published in 1996, which shares similarities with other hash functions designed in this time-period like MD4, MD5 and SHA-1.
Fukang Liu   +5 more
doaj   +1 more source

The Science of Guessing in Collision Optimized Divide-and-Conquer Attacks [PDF]

open access: yes, 2020
Recovering keys ranked in very deep candidate space efficiently is a very important but challenging issue in Side-Channel Attacks (SCAs). State-of-the-art Collision Optimized Divide-and-Conquer Attacks (CODCAs) extract collision information from a ...
Changhai Ou, Guiyuan Jiang, Siew-Kei Lam
core  

Toward Intrinsically Stretchable OLEDs with High Efficiency

open access: yesAdvanced Materials, EarlyView.
This perspective provides a systematic discussion on the challenges and solutions in designing materials for intrinsically stretchable organic light‐emitting diodes (ISOLEDs). It also highlights prospective challenges and offers insights into the development of highly efficient and stable ISOLEDs for practical applications.
Huanyu Zhou   +3 more
wiley   +1 more source

Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes

open access: yesIACR Transactions on Symmetric Cryptology, 2016
Since Knudsen and Rijmen proposed the known-key attacks in ASIACRYPT 2007, the open-key model becomes more and more popular. As the other component of the open-key model, chosen-key model was applied to the full attacks on AES-256 by Biryukov et al.
Xiaoyang Dong, Xiaoyun Wang
doaj   +1 more source

Collusion Detection using Predictive Functions based on Android Applications

open access: yesSukkur IBA Journal of Computing and Mathematical Sciences, 2023
Android is used by most of the population of the users. It is an attractive target for malicious application developers due to its open source nature. These malicious writers are developing new trends to steal sensitive information from the devices.
Aurangzeb Magsi, Asad Hameed Soomro
doaj   +1 more source

Multi-Player Bandits Robust to Adversarial Collisions [PDF]

open access: yesarXiv, 2022
Motivated by cognitive radios, stochastic Multi-Player Multi-Armed Bandits has been extensively studied in recent years. In this setting, each player pulls an arm, and receives a reward corresponding to the arm if there is no collision, namely the arm was selected by one single player. Otherwise, the player receives no reward if collision occurs.
arxiv  

Permanent Plasma Surface Functionalization of Internal Surface Areas

open access: yesAdvanced Materials Interfaces, EarlyView.
With applications in various fields including biomedical sciences, textiles, or filter industry, stable functionalization of porous membranes is indispensable. Plasma‐activated species with specific reactivities infiltrate porous substrates at different penetration depths due to their distinct energies and diffusivities.
Dirk Hegemann   +4 more
wiley   +1 more source

Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding

open access: yesTongxin xuebao, 2014
The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented.
Gao-li WANG, Yan-zhao SHEN
doaj   +2 more sources

Surface damage evolution of artillery barrel under high-temperature erosion and high-speed impact

open access: yesCase Studies in Thermal Engineering, 2023
Thermochemical erosion and mechanical wear are the primary sources of surface damage in artillery barrel chambers, severely restricting the interior ballistic characteristics and service life of the barrel weapon.
Shuli Li, Liqun Wang, Guolai Yang
doaj  

Unveiling the Aging Effect at the Interface of N719 Dye‐Sensitized Solar Cells

open access: yesAdvanced Materials Interfaces, EarlyView.
Iodide is incorporated into the N719 layer through two mechanisms: the known ligand exchange of NCS with I and a second yet unknown mechanism which significantly blocks the charge regeneration process of the N719 dye contributing to the cell degradation.
Sunita G. Adhikari   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy