Results 71 to 80 of about 1,691,785 (320)
Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing [PDF]
Cayley hash functions are based on a simple idea of using a pair of (semi)group elements, $A$ and $B$, to hash the 0 and 1 bit, respectively, and then to hash an arbitrary bit string in the natural way, by using multiplication of elements in the (semi ...
Bromberg, Lisa +2 more
core +1 more source
Quantifying Spin Defect Density in hBN via Raman and Photoluminescence Analysis
An all‐optical method is presented for quantifying the density of boron vacancy spin defects in hexagonal boron nitride (hBN). By correlating Raman and photoluminescence signals with irradiation fluence, defect‐induced Raman modes are identified and established an relationship linking optical signatures to absolute defect densities. This enables direct
Atanu Patra +8 more
wiley +1 more source
Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented.
Gao-li WANG, Yan-zhao SHEN
doaj +2 more sources
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee +3 more
doaj +1 more source
Analysis of simple 2-D and 3-D metal structures subjected to fragment impact [PDF]
Theoretical methods were developed for predicting the large-deflection elastic-plastic transient structural responses of metal containment or deflector (C/D) structures to cope with rotor burst fragment impact attack.
Rodal, J. J. A. +3 more
core +1 more source
Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks [PDF]
Both Wireless Mesh Network (WMN) and Wireless Sensor Network (WSN) are multi-hop wireless networks. WMN is an emerging community based integrated broadband wireless network which ensures high bandwidth ubiquitous internet provision to users, while, WSN ...
Loo, KK, Naeem, T
core +1 more source
Integrative Approaches for DNA Sequence‐Controlled Functional Materials
DNA is emerging as a programmable building block for functional materials with applications in biomimicry, biochemical, and mechanical information processing. The integration of simulations, experiments, and machine learning is explored as a means to bridge DNA sequences with macroscopic material properties, highlighting current advances and providing ...
Aaron Gadzekpo +4 more
wiley +1 more source
In this paper, we describe attacks on the recently proposed Haraka hash functions. First, for the two hash functions Haraka-256/256 and Haraka-512/256 in the family, we show how two colliding messages can be constructed in about 216 function ...
Jérémy Jean
doaj +1 more source
A Symbolic Intruder Model for Hash-Collision Attacks [PDF]
In the recent years, several practical methods have been published to compute collisions on some commonly used hash functions. In this paper we present a method to take into account, at the symbolic level, that an intruder actively attacking a protocol ...
Chevalier, Yannick, Kourjieh, Mounira
core +2 more sources
Classically in combinatorics on words one studies unavoidable regularities that appear in sufficiently long strings of symbols over a fixed size alphabet.
A. Restivo +16 more
core +2 more sources

