Results 21 to 30 of about 2,332 (255)

Multipoint Coordinative Capture of Olefinic Substrates Utilizing Metal‐Carbon Bonds by Macrocyclic Complex

open access: yesAngewandte Chemie, EarlyView.
We have developed a macrocyclic tetranuclear palladium complex, which has four coordination sites within its inner cavity as a host molecule. The complex captured squalene (C30H50), a linear triterpene with six C═C double bonds, through multipoint palladium‐carbon bonds, and formed a unique host‐guest complex with a folded‐squalene structure.
Kohtaro Sugawara   +2 more
wiley   +2 more sources

Rotational-XOR Cryptanalysis of Reduced-round SPECK

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In this paper we formulate a SAT/SMT model for Rotational-XOR (RX) cryptanalysis in ARX primitives for the first time. The model is successfully applied to the block cipher family Speck, and distinguishers covering more rounds than previously are found ...
Yunwen Liu   +3 more
doaj   +1 more source

A Multistate Adaptive System of Topologically Distinct Chiral Assemblies

open access: yesAngewandte Chemie, EarlyView.
This article presents a non‐covalent multistate system with seven distinct assembly products across solid and liquid states, generated from a single supramolecular synthon. Thermodynamic pathways between these states are switchable with simple external triggers.
Wiktoria Adamska   +6 more
wiley   +2 more sources

Hinge‐Like Mechanochromic Mechanophores Based on [2.2]Paracyclophane

open access: yesAngewandte Chemie, EarlyView.
Hinge‐like supramolecular mechanophores utilizing [2.2]paracyclophane have been developed. In the force‐free state, the rigid [2.2]paracyclophane forces two luminophores into proximity, leading to excimer‐dominant photoluminescence. Stretching the polyurethane films into which the mechanophores are covalently incorporated results in the structures of ...
Shohei Shimizu   +3 more
wiley   +2 more sources

Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
The security of immobiliser and Remote Keyless Entry systems has been extensively studied over many years. Passive Keyless Entry and Start systems, which are currently deployed in luxury vehicles, have not received much attention besides relay attacks ...
Lennert Wouters   +4 more
doaj   +1 more source

OPTIMSM: FPGA hardware accelerator for Zero-Knowledge MSM

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
The Multi-Scalar Multiplication (MSM) is the main barrier to accelerating Zero-Knowledge applications. In recent years, hardware acceleration of this algorithm on both FPGA and GPU has become a popular research topic and the subject of a multi-million ...
Xander Pottier   +5 more
doaj   +1 more source

Higher-Order Time Sharing Masking

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
At CHES 2024, Time Sharing Masking (TSM) was introduced as a novel low-latency masking technique for hardware circuits. TSM offers area and randomness efficiency, as well as glitch-extended PINI security, but it is limited to first-order security.
Dilip Kumar S. V.   +4 more
doaj   +1 more source

Secure, Accurate, and Practical Narrow-Band Ranging System

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Relay attacks pose a serious security threat to wireless systems, such as, contactless payment systems, keyless entry systems, or smart access control systems. Distance bounding protocols, which allow an entity to not only authenticate another entity but
Aysajan Abidin   +5 more
doaj   +1 more source

Two-permutation-based hashing with binary mixing

open access: yesJournal of Mathematical Cryptology, 2015
We consider the generic design of compression functions based on two n-bit permutations and XOR-based mixing functions. It is known that any such function mapping n+α${n+\alpha }$ to α bits, with 1≤α≤n${1\le \alpha \le n}$, can achieve at most min{2α/2 ...
Luykx Atul   +3 more
doaj   +1 more source

Classification of Balanced Quadratic Functions

open access: yesIACR Transactions on Symmetric Cryptology, 2019
S-boxes, typically the only nonlinear part of a block cipher, are the heart of symmetric cryptographic primitives. They significantly impact the cryptographic strength and the implementation characteristics of an algorithm.
Lauren De Meyer, Begül Bilgin
doaj   +1 more source

Home - About - Disclaimer - Privacy