Results 41 to 50 of about 53,319 (274)

Error-Tolerant Side-Channel Cube Attack Revisited [PDF]

open access: yes, 2014
Error-tolerant side-channel cube attacks have been recently introduced as an efficient cryptanalytic technique against block ciphers. The known Dinur-Shamir model and its extensions require error-free data for at least part of the measurements. Then, a new model was proposed at CHES 2013, which can recover the key in the scenario that each measurement ...
Zhenqi Li   +3 more
openaire   +1 more source

Breaking Grain-128 with Dynamic Cube Attacks [PDF]

open access: yes, 2011
We present a new variant of cube attacks called a dynamic cube attack. Whereas standard cube attacks [4] find the key by solving a system of linear equations in the key bits, the new attack recovers the secret key by exploiting distinguishers obtained from cube testers.
Itai Dinur, Adi Shamir
openaire   +1 more source

On the Security of a Latin-Bit Cube-Based Image Chaotic Encryption Algorithm

open access: yesEntropy, 2019
In this paper, the security analysis of an image chaotic encryption algorithm based on Latin cubes and bit cubes is given. The proposed algorithm adopts a first-scrambling-diffusion- second-scrambling three-stage encryption scheme.
Zeqing Zhang, Simin Yu
doaj   +1 more source

Performance of Pozzolan-Based Reactive Magnesia Cement Mixes against Sulphate Attack

open access: yesApplied Sciences, 2023
Reactive magnesia cement (RMC) has gained interest due to its lower production temperatures when compared to Portland cement. In this study, the performance of pozzolan-based RMC concrete samples against sulphate attack was examined.
Murugan Muthu   +2 more
doaj   +1 more source

Multimodal Mechanical Testing of Additively Manufactured Ti6Al4V Lattice Structures: Compression, Bending, and Fatigue

open access: yesAdvanced Engineering Materials, EarlyView.
In this experimental study, the mechanical properties of additively manufactured Ti‐6Al‐4V lattice structures of different geometries are characterized using compression, four point bending and fatigue testing. While TPMS designs show superior fatigue resistance, SplitP and Honeycomb lattice structures combine high stiffness and strength. The resulting
Klaus Burkart   +3 more
wiley   +1 more source

Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube [PDF]

open access: yes, 2019
Cryptographic algorithms play an important role in information security where it ensures the security of data across the network or storage. A key schedule algorithm is the mechanism that generates and schedules all session-keys for the encryption ...
Mushtaq, Muhammad Faheem
core  

Investigation of Laser Ablation and Brush Pre‐Treatments for AlCu Cold Roll Bonding in Oxygen‐Free Conditions

open access: yesAdvanced Engineering Materials, EarlyView.
It is shown that laser ablation pretreatment under oxygen‐free conditions enables copper–aluminium bonding at significantly lower deformation degrees and improved properties compared to mechanical brushing. Laser ablation further increases interface contact area and induces favourable residual stress states and microstructural compatibility ...
Khemais Barienti   +11 more
wiley   +1 more source

Multiscale Structuring of Hydroxyapatite via Two‐Photon Lithography of Nanocomposites

open access: yesAdvanced Functional Materials, EarlyView.
Hydroxyapatite scaffolds are of great interest in bone tissue engineering applications, ranging from 3D cell culture to regenerative medicine. Using two‐photon lithography of a transparent nanocomposite, hydroxyapatite microstructures with features ranging from submicron to centimeter‐scale are fabricated. This allows to mimic the natural bone geometry,
Leonhard Hambitzer   +6 more
wiley   +1 more source

A New Practical Cube Attack via Recovering Numerous Superpolys

open access: yesIACR Transactions on Symmetric Cryptology
Cube attack is one of the most powerful approaches for recovering keys of stream ciphers. Practical cube attacks generate several superpolys first and solve the system constructed by these superpolys afterward.
Min Zhang, Yao Sun
doaj   +1 more source

Cube Attacks on Tweakable Black Box Polynomials [PDF]

open access: yes, 2009
Almost any cryptographic scheme can be described by tweakable polynomials over GF (2), which contain both secret variables (e.g., key bits) and public variables (e.g., plaintext bits or IV bits). The cryptanalyst is allowed to tweak the polynomials by choosing arbitrary values for the public variables, and his goal is to solve the resultant system of ...
Itai Dinur, Adi Shamir
openaire   +1 more source

Home - About - Disclaimer - Privacy