Results 81 to 90 of about 136,963 (275)

Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes

open access: yesIACR Transactions on Symmetric Cryptology, 2016
Since Knudsen and Rijmen proposed the known-key attacks in ASIACRYPT 2007, the open-key model becomes more and more popular. As the other component of the open-key model, chosen-key model was applied to the full attacks on AES-256 by Biryukov et al.
Xiaoyang Dong, Xiaoyun Wang
doaj   +1 more source

4‐Hydroxybenzyl Alcohol Mitigates Hyperlipidemia‐Associated Depression by Inhibiting Neuroinflammation via the NKIRAS2/NF‐κB Pathway

open access: yesAdvanced Science, EarlyView.
4‐HBA upregulates NKIRAS2 levels, inhibiting the activation of the NF‐κB pathway and subsequently reducing the levels of neuroinflammatory markers. This modulation helps restore normal mood and behavior in hyperlipidemic conditions, providing a potential therapeutic strategy for managing hyperlipidemia‐associated depression.
Ying Zhang   +7 more
wiley   +1 more source

SAT-Based Space Partitioning and Applications to Ascon-Hash256 Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology
We introduce an efficient SAT-based space partitioning technique that enables systematic exploration of large search spaces in cryptanalysis. The approach divides complex search spaces into manageable subsets through combinatorial necklace generation ...
Guozhen Liu   +4 more
doaj   +1 more source

Sustainable Phosphorylated Cellulose Nanocrystals: A Dual‐Affinity Platform for High‐Efficiency Enrichment of Intact Glycopeptides and Phosphopeptides

open access: yesAdvanced Science, EarlyView.
AAA ABSTRACT Protein glycosylation and phosphorylation are critical post‐translational modifications (PTMs) governing nearly all cellular functions, yet their analysis remains challenging due to reliance on costly and unsustainable enrichment materials.
Jiaying Li   +9 more
wiley   +1 more source

Plaintext-based Side-channel Collision Attack [PDF]

open access: yesIACR Communications in Cryptology
Side-channel Collision Attacks (SCCA) is a classical method that exploits information dependency leaked during cryptographic operations. Unlike collision attacks that seek instances where two different inputs to a cryptographic algorithm yield identical outputs, SCCAs specifically target the internal state, where identical outputs are more likely ...
Wu, L.   +4 more
openaire   +1 more source

Constraint of Lignin–Carbohydrate Complex Orchestrated on Polyphenol in Oil–Water Interface Targeting Ulcerative Colitis Therapy

open access: yesAdvanced Science, EarlyView.
This study constructed the W1/O/W2 emulsion–based targeted therapy delivery system for ulcerative colitis (UC) utilizing LCC as surfactant for the first time. This multifunctional emulsion offered certain therapeutic advantages for UC, including targeted colonic delivery of active compounds, synergistic modulation of gut microbiota through combined ...
Qian Wu   +9 more
wiley   +1 more source

Numerical Calculation of Aerodynamic Characteristics of Low-Speed Aircraft under Heavy Rainfall Conditions [PDF]

open access: yesHangkong bingqi
Aiming at the aerodynamic characteristics of a low-speed aircraft in a rainstorm environment, an adapted numerical computation scheme is constructed based on the computational fluid dynamics method, taking into account the continuous-phase control ...
Yuan Peijun, Chang Sijiang, Dai Yuewei, Zhang Jialiang
doaj   +1 more source

One Password: An Encryption Scheme for Hiding Users' Register Information

open access: yes, 2017
In recent years, the attack which leverages register information (e.g. accounts and passwords) leaked from 3rd party applications to try other applications is popular and serious. We call this attack "database collision".
Zhao, Bo, Zhou, Yu
core  

Biolipid Film‐Fused Electrochemiluminescence for Multipurpose In Situ Bioassays

open access: yesAdvanced Science, EarlyView.
An ECL‐emissive, membrane‐interactive scaffold was fabricated, and facilely fused with natural and non‐native phospholipids into multifactorial mimicries of cytomembranes and vesicles for in vitro representative membrane‐process probing. Such a biointerface‐based, state‐sensitive ECL paradigm not only pinpointed proximal phenomena, including channeling
Jialiang Chen   +9 more
wiley   +1 more source

Analysis of simple 2-D and 3-D metal structures subjected to fragment impact [PDF]

open access: yes, 1977
Theoretical methods were developed for predicting the large-deflection elastic-plastic transient structural responses of metal containment or deflector (C/D) structures to cope with rotor burst fragment impact attack.
Rodal, J. J. A.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy