Results 51 to 60 of about 136,963 (275)

Observation of Two‐Photon Resonant Raman Scattering via the Biexciton Level in Two‐Dimensional Halide Perovskite (C6H5C2H4NH3)2PbI4

open access: yesAdvanced Functional Materials, EarlyView.
Efficient two‐photon resonant Raman scattering (TRRS) is observed in the layered perovskite (PEA)2PbI4, with the biexciton level acting as an intermediate state. TRRS undergoes two‐photon frequency shift upon input frequency tuning, persists up to 90 K, and shows clear threshold behavior and polarization selection rules.
Seung Han Shin   +7 more
wiley   +1 more source

Collision attack on reduced-round Camellia [PDF]

open access: yesScience in China Series F, 2005
Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct some efficient distinguishers between 4-round Camellia and a random permutation of the blocks space. By using collision-searching techniques, the distinguishers are used to attack on 6, 7, 8 and 9 rounds of Camellia with 128-bit key and 8, 9 and 10 rounds of ...
openaire   +1 more source

Practical Collision Attacks against Round-Reduced SHA-3 [PDF]

open access: yesJournal of Cryptology, 2019
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Guo, Jian   +5 more
openaire   +3 more sources

On the optimality of individual entangling-probe attacks against BB84 quantum key distribution

open access: yes, 2007
It is shown that an existing method to study ideal individual attacks on the BB84 QKD protocol using error discard can be adapted to reconciliation with error correction, and that an optimal attack can be explicitly found.
Bettelli, S.   +3 more
core   +1 more source

High‐Throughput Exfoliation of Optoelectronic‐Grade MoS2 via Turbulent‐Flow Wet Jet Milling

open access: yesAdvanced Functional Materials, EarlyView.
A scalable wet jet milling exfoliation method is demonstrated for producing optoelectronic‐grade MoS2 nanosheets using environmentally friendly ethyl cellulose in ethanol dispersion media. Guided by fluid dynamics modeling, this approach is optimized to achieve record‐high exfoliation throughput and concentration.
Maryam Khalaj   +7 more
wiley   +1 more source

Chosen-Prefix Collisions on AES-like Hashing

open access: yesIACR Transactions on Symmetric Cryptology
Chosen-prefix collision (CPC) attack was first presented by Stevens, Lenstra and de Weger on MD5 at Eurocrypt 2007. A CPC attack finds a collision for any two chosen prefixes, which is a stronger variant of collision attack. CPCs are naturally harder to
Shiyao Chen   +3 more
doaj   +1 more source

Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing [PDF]

open access: yes, 2014
Cayley hash functions are based on a simple idea of using a pair of (semi)group elements, $A$ and $B$, to hash the 0 and 1 bit, respectively, and then to hash an arbitrary bit string in the natural way, by using multiplication of elements in the (semi ...
Bromberg, Lisa   +2 more
core   +1 more source

Combinatorics on words in information security: Unavoidable regularities in the construction of multicollision attacks on iterated hash functions

open access: yes, 2011
Classically in combinatorics on words one studies unavoidable regularities that appear in sufficiently long strings of symbols over a fixed size alphabet.
A. Restivo   +16 more
core   +2 more sources

Fluorescent Nanosensor for Indole‐3‐Propionic Acid Detection in Gut Health Monitoring

open access: yesAdvanced Healthcare Materials, EarlyView.
This work introduces a fluorescent nanosensor system with two optical modalities for detection of indole‐3‐propionic acid (IPA) gut metabolite: (1) blue‐emitting cationic conjugated polyelectrolyte (CP3) and (2) near‐infrared (NIR)‐emitting CP3‐wrapped single‐walled carbon nanotube (SWNT).
Mervin Chun‐Yi Ang   +15 more
wiley   +1 more source

Some observations of near collision attacks on grain v1

open access: yesCybersecurity
Near collision attacks and fast near collision attacks on stream ciphers are controversial attack methods in the field of cryptography in recent years, and their attack results are based on reduced experimental observations and derivation of birthday ...
Shaoyu Du, Weiping Gu, Bin Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy