Results 51 to 60 of about 136,963 (275)
Efficient two‐photon resonant Raman scattering (TRRS) is observed in the layered perovskite (PEA)2PbI4, with the biexciton level acting as an intermediate state. TRRS undergoes two‐photon frequency shift upon input frequency tuning, persists up to 90 K, and shows clear threshold behavior and polarization selection rules.
Seung Han Shin +7 more
wiley +1 more source
Collision attack on reduced-round Camellia [PDF]
Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct some efficient distinguishers between 4-round Camellia and a random permutation of the blocks space. By using collision-searching techniques, the distinguishers are used to attack on 6, 7, 8 and 9 rounds of Camellia with 128-bit key and 8, 9 and 10 rounds of ...
openaire +1 more source
Practical Collision Attacks against Round-Reduced SHA-3 [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Guo, Jian +5 more
openaire +3 more sources
On the optimality of individual entangling-probe attacks against BB84 quantum key distribution
It is shown that an existing method to study ideal individual attacks on the BB84 QKD protocol using error discard can be adapted to reconciliation with error correction, and that an optimal attack can be explicitly found.
Bettelli, S. +3 more
core +1 more source
High‐Throughput Exfoliation of Optoelectronic‐Grade MoS2 via Turbulent‐Flow Wet Jet Milling
A scalable wet jet milling exfoliation method is demonstrated for producing optoelectronic‐grade MoS2 nanosheets using environmentally friendly ethyl cellulose in ethanol dispersion media. Guided by fluid dynamics modeling, this approach is optimized to achieve record‐high exfoliation throughput and concentration.
Maryam Khalaj +7 more
wiley +1 more source
Chosen-Prefix Collisions on AES-like Hashing
Chosen-prefix collision (CPC) attack was first presented by Stevens, Lenstra and de Weger on MD5 at Eurocrypt 2007. A CPC attack finds a collision for any two chosen prefixes, which is a stronger variant of collision attack. CPCs are naturally harder to
Shiyao Chen +3 more
doaj +1 more source
Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing [PDF]
Cayley hash functions are based on a simple idea of using a pair of (semi)group elements, $A$ and $B$, to hash the 0 and 1 bit, respectively, and then to hash an arbitrary bit string in the natural way, by using multiplication of elements in the (semi ...
Bromberg, Lisa +2 more
core +1 more source
Classically in combinatorics on words one studies unavoidable regularities that appear in sufficiently long strings of symbols over a fixed size alphabet.
A. Restivo +16 more
core +2 more sources
Fluorescent Nanosensor for Indole‐3‐Propionic Acid Detection in Gut Health Monitoring
This work introduces a fluorescent nanosensor system with two optical modalities for detection of indole‐3‐propionic acid (IPA) gut metabolite: (1) blue‐emitting cationic conjugated polyelectrolyte (CP3) and (2) near‐infrared (NIR)‐emitting CP3‐wrapped single‐walled carbon nanotube (SWNT).
Mervin Chun‐Yi Ang +15 more
wiley +1 more source
Some observations of near collision attacks on grain v1
Near collision attacks and fast near collision attacks on stream ciphers are controversial attack methods in the field of cryptography in recent years, and their attack results are based on reduced experimental observations and derivation of birthday ...
Shaoyu Du, Weiping Gu, Bin Zhang
doaj +1 more source

