Results 61 to 70 of about 36,777 (311)

Ultra‐Durable Information‐Encoded Anti‐Counterfeiting Self‐Assembled Nanocrystal Labels

open access: yesAdvanced Optical Materials, EarlyView.
Ultra‐durable cost‐effective information‐encoded anti‐counterfeiting labels are fabricated to secure semiconductor chips. A novel method is used to self‐assemble colloidal quantum wells (CQWs) into color bars. Information can be encoded spatially, spectrally, and opto‐spatially.
Taha Haddadifam   +6 more
wiley   +1 more source

Forgery Cyber-Attack Supported by LSTM Neural Network: An Experimental Case Study

open access: yesSensors, 2023
This work is concerned with the vulnerability of a network industrial control system to cyber-attacks, which is a critical issue nowadays. This is because an attack on a controlled process can damage or destroy it.
Krzysztof Zarzycki   +7 more
doaj   +1 more source

Quantum authentication of classical messages

open access: yes, 2001
Although key distribution is arguably the most studied context on which to apply quantum cryptographic techniques, message authentication, i.e., certifying the identity of the message originator and the integrity of the message sent, can also benefit ...
Curty, Marcos, Santos, David J.
core   +1 more source

Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs

open access: yes, 2023
At CRYPTO’18, Datta et al. proposed nPolyMAC and proved the security up to 22𝑛/3 authentication queries and 2𝑛 verification queries. At EUROCRYPT’19, Dutta et al. proposed CWC+ and showed the se- curity up to 22𝑛/3 queries. At FSE’19, Datta et al. proposed PolyMAC and its key-reduced variant 2k-PolyMAC, and showed the security up to 22𝑛/3 queries. This
Shen, Yaobin   +3 more
openaire   +2 more sources

Electronic Interaction at Cu–O–Ni Heterointerface Promotes Electrocatalytic Nitrate Reduction to Ammonia and Zinc‐Nitrate Battery

open access: yesAdvanced Science, EarlyView.
The strong Cu–O–Ni electronic interaction in the heterostructured catalyst can enhance the effective adsorption of NO3− and accelerate the in situ hydrolysis dissociation of the hydrogenation step. The Zn‐NO3 hybrid battery assembled with this catalyst achieves an open‐circuit voltage of 1.45 V, a peak power density of 6.47 mW cm−2, and can ...
Taozhi Lv   +5 more
wiley   +1 more source

Algebraic Fault Analysis of SHA-256 Compression Function and Its Application

open access: yesInformation, 2021
Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on.
Kazuki Nakamura   +2 more
doaj   +1 more source

Improvement of a quantum broadcasting multiple blind signature scheme based on quantum teleportation

open access: yes, 2015
Recently, a broadcasting multiple blind signature scheme based on quantum teleportation has been proposed for the first time. It is claimed to have unconditional security and properties of quantum multiple signature and quantum blind signature.
Qiu, Daowen, Zhang, Wei, Zou, Xiangfu
core   +1 more source

Twisted Polynomials and Forgery Attacks on GCM [PDF]

open access: yes, 2015
Polynomial hashing as an instantiation of universal hashing is a widely employed method for the construction of MACs and authenticated encryption (AE) schemes, the ubiquitous GCM being a prominent example. It is also used in recent AE proposals within the CAESAR competition which aim at providing nonce misuse resistance, such as POET.
Mohamed Ahmed Abdelraheem   +3 more
openaire   +1 more source

Urea‐Formaldehyde Resin Confined Silicon Nanodots Composites: High‐Performance and Ultralong Persistent Luminescence for Dynamic AI Information Encryption

open access: yesAdvanced Science, EarlyView.
Schematic illustration of SiNDs composite materials synthesis and its internal photophysical process mechanism. And an AI‐assisted dynamic information encryption process. ABSTRACT Persistent luminescence materials typically encounter an intrinsic trade‐off between high phosphorescence quantum yield (PhQY) and ultralong phosphorescence lifetime.
Yulu Liu   +9 more
wiley   +1 more source

A Structured Multi-signature Scheme Against Forgery Attack [PDF]

open access: yesInternational Journal of Wireless and Microwave Technologies, 2011
There are some classic structured multi-signature programs, such as Burmester’s, Harn’s and Lin’s schemes that can not resist inside attack and outside attack. In this paper, we briefly review Burmester’s program and relate safety analysis, Burmester’s scheme vulnerable to forgery attack.
Wenjun Luo, Changying Li
openaire   +1 more source

Home - About - Disclaimer - Privacy