Results 51 to 60 of about 153 (84)
Xanthones derived from mangosteen pericarp are valuable bioactive compounds; however, conventional extraction methods often depend on organic solvents or exhibit low efficiency. To explore an effective and environmentally sustainable extraction method, medium‐chain triglycerides (MCTs) were adopted as a natural solvent in combination with ultrasonic ...
Hua Liu +10 more
wiley +1 more source
Pholkos -- Efficient Large-state Tweakable Block Ciphers from the AES Round Function [PDF]
With the dawn of quantum computers, higher security than $128$ bits has become desirable for primitives and modes. During the past decade, highly secure hash functions, MACs, and encryption schemes have been built primarily on top of keyless permutations,
Eik List +3 more
core
Conductive nanomaterials (CNMs) show promising potential in cardiac tissue regeneration and restoring cardiac rhythm as reported in several in vitro studies. This review article elaborates on the applications of CNMs in the treatment of myocardial infarction (MI) and MI‐induced cardiac arrhythmias, and it sheds light on the innovative approach of ...
Sumithra Y. Srinivasan, Anna Laromaine
wiley +1 more source
This review provides a detailed introduction to the fabrication and modulation of nanostructured mechano‐bactericidal surfaces and emphasizes integration of photoactive materials, chemical biocides, stimuli‐responsive self‐cleaning coatings, and electro‐mediated strategies to achieve multifunctional and synergistic antimicrobial effects, providing ...
Yiwen Zhong +8 more
wiley +1 more source
A Holistic Framework for Impossible Boomerang Attacks [PDF]
In 2011, Lu introduced the impossible boomerang attack at DCC. This powerful cryptanalysis technique combines the strengths of the impossible differential and boomerang attacks, thereby inheriting the advantages of both cryptographic techniques.
Jiahao Zhao +5 more
core
Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY [PDF]
The impossible boomerang (IB) attack was first introduced by Lu in his doctoral thesis and subsequently published at DCC in 2011. The IB attack is a variant of the impossible differential (ID) attack by incorporating the idea of the boomerang attack.
Deng Tang, Haoyang Wang, Jianing Zhang
core
Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials [PDF]
Collision attacks on AES-like hashing (hash functions constructed by plugging AES-like ciphers or permutations into the famous PGV modes or their variants) can be reduced to the problem of finding a pair of inputs respecting a differential of the ...
Congming Wei +5 more
core
Forking Sums of Permutations for Optimally Secure and Highly Efficient PRFs [PDF]
The desirable encryption scheme possesses high PRF security, high efficiency, and the ability to produce variable-length outputs. Since designing dedicated secure PRFs is difficult, a series of works was devoted to building optimally secure PRFs from the
Avijit Dutta, Eik List, Jian Guo
core
Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption [PDF]
In this paper, we investigate the efficiency of FPGA implementations of AES and AES-like ciphers, specially in the context of authenticated encryption. We consider the encryption/decryption and the authentication/verification structures of OCB-like modes
Anupam Chattopadhyay +2 more
core
Integral attacks on reduced-round Deoxys-BC and RAIN algorithms
Considering the impact of tweakeys on tweakable block cipher algorithms, achieved integral attacks on Deoxys-BC and RAIN algorithms by combining zero-correlation linear cryptanalysis with integral attacks and utilizing partial-sum technique. 176 types of
Du Xiaoni +3 more
doaj

