Results 61 to 70 of about 1,678,458 (327)
A Meaningful MD5 Hash Collision Attack [PDF]
It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that would generate two different messages that gives the same MD5 sum. Many conditions need to be satisfied to attain this collision.
Kashyap, Narayana D.
core +1 more source
By combining porous, solid, and carbon fiber‐reinforced thermoplastic polyurethane within a single 3D printed honeycomb structure, this current work achieved precise control over spatial stiffness while ensuring strong interlayer adhesion. The findings demonstrate enhanced energy absorption and densification strain, outperforming traditional uniform ...
Savvas Koltsakidis +2 more
wiley +1 more source
X‐Ray Tomography Analysis of Damage Mechanisms in Metal Matrix Syntactic Foams During Compression
In situ synchrotron X‐ray tomography is used to investigate the internal damage mechanisms of AlSi12 metal matrix syntactic foam with ceramic hollow spheres during compressive loading. It is concluded that a homogeneous distribution of the second‐phase filler material results in a sequential collapse in a localized region; this leads to controlled and ...
Indrajeet Tambe +8 more
wiley +1 more source
The puncture prevention and energy absorption performance of composite metal foam (CMF) are studied experimentally and numerically for hazardous materials transportation protection. The numerical model implementing air within the CMF (nonhomogeneous model using fluid cavity technique) predicts puncture more accurately compared to the homogeneous CMF ...
Aman Kaushik, Afsaneh Rabiei
wiley +1 more source
Chosen-Prefix Collisions on AES-like Hashing
Chosen-prefix collision (CPC) attack was first presented by Stevens, Lenstra and de Weger on MD5 at Eurocrypt 2007. A CPC attack finds a collision for any two chosen prefixes, which is a stronger variant of collision attack. CPCs are naturally harder to
Shiyao Chen +3 more
doaj +1 more source
PBTTT‐OR‐R, a C14‐alkoxy/alkyl‐PBTTT polymer derivative, is of substantial interest for optoelectronics due to its specific fullerene intercalation behavior and enhanced charge‐transfer absorption. Comparing this polymer with (S) and without (O) homocoupling defects reveals that PBTTT‐OR‐R(O) forms stable co‐crystals with PC61BM, while PBTTT‐OR‐R(S ...
Zhen Liu +14 more
wiley +1 more source
A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure
We analyze the security of RSA prime generation implemented on embedded devices by a practical power analysis attack. Unlike previous differential power analysis-based attack on primality tests of RSA prime generation exploiting the deterministic ...
Sangyub Lee +3 more
doaj +1 more source
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee +3 more
doaj +1 more source
The Science of Guessing in Collision-Optimized Divide-and-Conquer Attacks
Recovering keys ranked in very deep candidate space efficiently is a very important but challenging issue in side-channel attacks (SCAs). State-of-the-art collision-optimized divide-and-conquer attacks (CODCAs) extract collision information from a collision attack to optimize the key recovery of a divide-and-conquer attack, and transform the very huge ...
Changhai Ou, Siew-Kei Lam, Guiyuan Jiang
openaire +2 more sources

