Results 71 to 80 of about 133,184 (295)
Research and design of authenticated encryption algorithm based on AES round function
The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time,and has extensive research and application prospects in the field of information security.With the mixed integer linear programming ...
Guoqiang GAO, Zichen LI
doaj +3 more sources
Collision Attack on 5 Rounds of Grøstl [PDF]
In this article, we describe a novel collision attack for up to 5 rounds of the Grostl hash function. This significantly improves upon the best previously published results on 3 rounds. By using a new type of differential trail spanning over more than one message block we are able to construct collisions for Grostl-256 on 4 and 5 rounds with complexity
Florian Mendel +2 more
openaire +2 more sources
Security and defence of mobile systems under impact [PDF]
The Group “Dynamics and Fracture of Structural Elements” offers its experience in Solid Mechanics analysis for the study of the impact protection of vehicles, aircrafts and persons.
Arias Hernández, Ángel +1 more
core +1 more source
Classically in combinatorics on words one studies unavoidable regularities that appear in sufficiently long strings of symbols over a fixed size alphabet.
A. Restivo +16 more
core +2 more sources
A microfluidic system enables the rapid, room‐temperature fabrication of channel‐rich Pd‐Cu alloy nanodendrites with tunable composition, uniform morphology, and finely branched internal structures. The resulting catalysts exhibit over 90% formate selectivity across a broad potential window, along with excellent CO tolerance and enhanced long‐term ...
Xintong Huang +7 more
wiley +1 more source
Collusion Detection using Predictive Functions based on Android Applications
Android is used by most of the population of the users. It is an attractive target for malicious application developers due to its open source nature. These malicious writers are developing new trends to steal sensitive information from the devices.
Aurangzeb Magsi, Asad Hameed Soomro
doaj +1 more source
Attacks on quantum key distribution protocols that employ non-ITS authentication
We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously.
A Abidin +25 more
core +1 more source
Confinement Driven Spin‐Texture Evolution in Directly Written Nanomagnets
Spin‐texture is directly written by triggering lattice ordering locally at the nanoscale. Geometric confinement drives the formation of spin‐textures such as Néel walls with perpendicular core spins, essential for technological applications. Abstract In low‐dimensional magnetic structures, magnetostatic energy minimization yields a uniform spin‐texture,
Md. Shadab Anwar +11 more
wiley +1 more source
SAT-Based Space Partitioning and Applications to Ascon-Hash256 Cryptanalysis
We introduce an efficient SAT-based space partitioning technique that enables systematic exploration of large search spaces in cryptanalysis. The approach divides complex search spaces into manageable subsets through combinatorial necklace generation ...
Guozhen Liu +4 more
doaj +1 more source
This review explores functional and responsive materials for triboelectric nanogenerators (TENGs) in sustainable smart agriculture. It examines how particulate contamination and dirt affect charge transfer and efficiency. Environmental challenges and strategies to enhance durability and responsiveness are outlined, including active functional layers ...
Rafael R. A. Silva +9 more
wiley +1 more source

