Results 61 to 70 of about 131,000 (194)

Analysis of simple 2-D and 3-D metal structures subjected to fragment impact [PDF]

open access: yes, 1977
Theoretical methods were developed for predicting the large-deflection elastic-plastic transient structural responses of metal containment or deflector (C/D) structures to cope with rotor burst fragment impact attack.
Rodal, J. J. A.   +3 more
core   +1 more source

Research and design of authenticated encryption algorithm based on AES round function

open access: yes网络与信息安全学报, 2020
The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time,and has extensive research and application prospects in the field of information security.With the mixed integer linear programming ...
Guoqiang GAO, Zichen LI
doaj   +3 more sources

Collusion Detection using Predictive Functions based on Android Applications

open access: yesSukkur IBA Journal of Computing and Mathematical Sciences, 2023
Android is used by most of the population of the users. It is an attractive target for malicious application developers due to its open source nature. These malicious writers are developing new trends to steal sensitive information from the devices.
Aurangzeb Magsi, Asad Hameed Soomro
doaj   +1 more source

Security and defence of mobile systems under impact [PDF]

open access: yes, 2008
The Group “Dynamics and Fracture of Structural Elements” offers its experience in Solid Mechanics analysis for the study of the impact protection of vehicles, aircrafts and persons.
Arias Hernández, Ángel   +1 more
core   +1 more source

On the optimality of individual entangling-probe attacks against BB84 quantum key distribution

open access: yes, 2007
It is shown that an existing method to study ideal individual attacks on the BB84 QKD protocol using error discard can be adapted to reconciliation with error correction, and that an optimal attack can be explicitly found.
Bettelli, S.   +3 more
core   +1 more source

Collision Attack on 5 Rounds of Grøstl [PDF]

open access: yes, 2015
In this article, we describe a novel collision attack for up to 5 rounds of the Grostl hash function. This significantly improves upon the best previously published results on 3 rounds. By using a new type of differential trail spanning over more than one message block we are able to construct collisions for Grostl-256 on 4 and 5 rounds with complexity
Florian Mendel   +2 more
openaire   +2 more sources

Combinatorics on words in information security: Unavoidable regularities in the construction of multicollision attacks on iterated hash functions

open access: yes, 2011
Classically in combinatorics on words one studies unavoidable regularities that appear in sufficiently long strings of symbols over a fixed size alphabet.
A. Restivo   +16 more
core   +2 more sources

Attacks on quantum key distribution protocols that employ non-ITS authentication

open access: yes, 2015
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin   +25 more
core   +1 more source

Numerical Calculation of Aerodynamic Characteristics of Low-Speed Aircraft under Heavy Rainfall Conditions [PDF]

open access: yesHangkong bingqi
Aiming at the aerodynamic characteristics of a low-speed aircraft in a rainstorm environment, an adapted numerical computation scheme is constructed based on the computational fluid dynamics method, taking into account the continuous-phase control ...
Yuan Peijun, Chang Sijiang, Dai Yuewei, Zhang Jialiang
doaj   +1 more source

Home - About - Disclaimer - Privacy