Results 41 to 50 of about 17,540 (147)

Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks [PDF]

open access: yes, 2006
In this paper we evaluate the resistance of stream ciphers with linear feedback against fast algebraic attacks. We summarize the current knowledge about fast algebraic attacks, develop new and more efficient algorithms to evaluate the resistance against fast algebraic attacks, study theoretical bounds on the attacks, and apply our methodology to the ...
Braeken, An, Lano, Joseph, Preneel, Bart
openaire   +2 more sources

Robustness Assessment of Public Transport Networks in Various Graph Representations: Systematic Review, Decision Support, and Case Study

open access: yesNetworks, EarlyView.
ABSTRACT The analysis of certain properties of the underlying graph of a public transport network generates insights about the network's structure. Hereby, the choice of the graph representation depends on a trade‐off between complexity reduction and information preservation to adequately model a public transport network.
Michael Palk   +2 more
wiley   +1 more source

An Innovative Feasible Approach for Multi-Media Security Using Both Chaotic and Elliptic Curve Structures

open access: yesIEEE Access
Researchers concentrate on data security using cryptography, using different approaches to protect confidential data, such as digital images holding private information.
Tanveer Qayyum   +4 more
doaj   +1 more source

Sliding Mode Control in Aerospace Applications: A Survey

open access: yesInternational Journal of Robust and Nonlinear Control, EarlyView.
ABSTRACT Sliding mode control (SMC) enjoys robustness to matched and unmatched (in the case of minimum phase input‐output dynamics) bounded perturbations, and finite time convergence. Second‐order and higher‐order sliding mode control systems (2‐SMC/HOSMC) retain all the advantages of sliding mode control, but in addition can be applied to systems of ...
Yuri Shtessel, Christopher Edwards
wiley   +1 more source

On the Security of Split-and-Lookup-Based ZK-Friendly Primitives

open access: yesIACR Transactions on Symmetric Cryptology
Arithmetization-Oriented hash functions are optimized for their verification to be efficiently implemented within various proof systems, but they are often too slow when evaluated on a regular machine.
Antoine Bak, Léo Perrin
doaj   +1 more source

Modeling the Thermal Properties of Hydrogen‐Based Direct Reduced Iron Using Computational Thermodynamics and Machine Learning

open access: yessteel research international, EarlyView.
Hydrogen‐based direct reduced iron (H‐DRI) melts differently from scrap and carbon‐bearing DRI. This work combines differential scanning calorimetry experiments, FactSage thermodynamics, and simple composition‐based regression to predict solidus, liquidus, heat capacity, and enthalpy for H‐DRI.
Ankur Agnihotri   +3 more
wiley   +1 more source

Group theory in cryptography [PDF]

open access: yes, 2010
This paper is a guide for the pure mathematician who would like to know more about cryptography based on group theory. The paper gives a brief overview of the subject, and provides pointers to good textbooks, key research papers and recent survey papers ...
Blackburn, Simon R.   +2 more
core  

Quantum State‐Resolved Photodissociation Dynamics Study of Transition‐Metal Carbonyl and Nitrosyl

open access: yesThe Chemical Record, EarlyView.
State‐resolved scattering measurements provide experimental visualization of nuclear motions in reacting molecules. Carbonyls and nitrosyls are typical ligands in most of the transition‐metal complexes, which undergo dissociation upon visible and ultraviolet photoexcitation.
Keigo Nagamori   +2 more
wiley   +1 more source

Experimental realization of a highly secure chaos communication under strong channel noise

open access: yes, 2004
A one-way coupled spatiotemporally chaotic map lattice is used to contruct cryptosystem. With the combinatorial applications of both chaotic computations and conventional algebraic operations, our system has optimal cryptographic properties much better ...
Blahut   +28 more
core   +1 more source

Post-Quantum Cryptography: S381 Cyclic Subgroup of High Order

open access: yes, 2017
Currently there is an active Post-Quantum Cryptography (PQC) solutions search, which attempts to find cryptographic protocols resistant to attacks by means of for instance Shor polynomial time algorithm for numerical field problems like integer ...
Hecht, Pedro
core   +1 more source

Home - About - Disclaimer - Privacy