Analysis of simple 2-D and 3-D metal structures subjected to fragment impact [PDF]
Theoretical methods were developed for predicting the large-deflection elastic-plastic transient structural responses of metal containment or deflector (C/D) structures to cope with rotor burst fragment impact attack.
Rodal, J. J. A.+3 more
core +1 more source
Research and design of authenticated encryption algorithm based on AES round function
The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time,and has extensive research and application prospects in the field of information security.With the mixed integer linear programming ...
Guoqiang GAO, Zichen LI
doaj +3 more sources
Collusion Detection using Predictive Functions based on Android Applications
Android is used by most of the population of the users. It is an attractive target for malicious application developers due to its open source nature. These malicious writers are developing new trends to steal sensitive information from the devices.
Aurangzeb Magsi, Asad Hameed Soomro
doaj +1 more source
Security and defence of mobile systems under impact [PDF]
The Group “Dynamics and Fracture of Structural Elements” offers its experience in Solid Mechanics analysis for the study of the impact protection of vehicles, aircrafts and persons.
Arias Hernández, Ángel+1 more
core +1 more source
On the optimality of individual entangling-probe attacks against BB84 quantum key distribution
It is shown that an existing method to study ideal individual attacks on the BB84 QKD protocol using error discard can be adapted to reconciliation with error correction, and that an optimal attack can be explicitly found.
Bettelli, S.+3 more
core +1 more source
Collision Attack on 5 Rounds of Grøstl [PDF]
In this article, we describe a novel collision attack for up to 5 rounds of the Grostl hash function. This significantly improves upon the best previously published results on 3 rounds. By using a new type of differential trail spanning over more than one message block we are able to construct collisions for Grostl-256 on 4 and 5 rounds with complexity
Florian Mendel+2 more
openaire +2 more sources
Classically in combinatorics on words one studies unavoidable regularities that appear in sufficiently long strings of symbols over a fixed size alphabet.
A. Restivo+16 more
core +2 more sources
Predictor-Based Collision-Free and Connectivity-Preserving Resilient Formation Control for Multi-Agent Systems under Sensor Deception Attacks [PDF]
Zhou Shu, Qidong Liu, Yang Yang
openalex +2 more sources
Attacks on quantum key distribution protocols that employ non-ITS authentication
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin+25 more
core +1 more source
Numerical Calculation of Aerodynamic Characteristics of Low-Speed Aircraft under Heavy Rainfall Conditions [PDF]
Aiming at the aerodynamic characteristics of a low-speed aircraft in a rainstorm environment, an adapted numerical computation scheme is constructed based on the computational fluid dynamics method, taking into account the continuous-phase control ...
Yuan Peijun, Chang Sijiang, Dai Yuewei, Zhang Jialiang
doaj +1 more source