Results 61 to 70 of about 257,742 (291)
Security of signed ELGamal encryption [PDF]
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against the adaptive chosen ciphertext attack, in which an attacker can freely use
Jakobsson, Markus, Schnorr, Claus Peter
core
Efficient public-key cryptography with bounded leakage and tamper resilience [PDF]
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks.
A Faonio +46 more
core +2 more sources
This critical review presents a comprehensive roadmap for the precision 3D printing of cellulose. Quantitative correlations link ink formulation and rheological properties to print fidelity and final material performance. This framework guides the development of advanced functional materials, from biomedical scaffolds to electromagnetic shielding ...
Majed Amini +3 more
wiley +1 more source
Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs
We devise the first closed formula for the number of rounds of a blockcipher with secret components so that these components can be revealed using multiset, algebraic-degree, or division-integral properties, which in this case are equivalent.
Alex Biryukov +2 more
doaj +1 more source
Online Template Attacks: Revisited
An online template attack (OTA) is a powerful technique previously used to attack elliptic curve scalar multiplication algorithms. This attack has only been analyzed in the realm of power consumption and EM side channels, where the signals leak related ...
Alejandro Cabrera Aldaya +1 more
doaj +1 more source
Model-Based Generation of Attack-Fault Trees
Joint safety and security analysis of cyber-physical systems is a necessary step to correctly capture inter-dependencies between these properties. Attack-Fault Trees represent a combination of dynamic Fault Trees and Attack Trees and can be used to model and model-check a holistic view on both safety and security.
Raffaela Groner +7 more
openaire +3 more sources
This review identifies key design considerations for insect‐inspired microrobots capable of multimodal locomotion. To draw inspiration, biological and robotic strategies for moving in air, on water surfaces, and underwater are examined, along with approaches for crossing the air–water interface.
Mija Jovchevska +2 more
wiley +1 more source
Computational Modeling of Dynamic Stability Derivatives for Generic Airfoils
This paper presents a method for the computation of the static and dynamic stability derivatives of generic airfoils using high fidelity Computational Fluid Dynamics.
Mumtaz Muhammad Saleem +2 more
doaj +1 more source
This study reveals that Urolithin A (UA) counteracts alcohol‐induced cognitive and social dysfunction (AICSD) via a gut microbiome‐dependent mechanism. UA‐enriched Bacteroids sartorii and Parabacteroids distasonis elevate anandamide (AEA), which activates the CB1R‐DRD2‐Rap1 signaling cascade to drive synaptic repair and reduce neuroinflammation ...
Hongbo Zhang +9 more
wiley +1 more source
Differential Attacks on Generalized Feistel Schemes [PDF]
While generic attacks on classical Feistel schemes and unbalanced Feistel schemes have been studied a lot, generic attacks on several generalized Feistel schemes like type-1, type-2 and type-3 and alternating Feistel schemes, as defined in [8], have not been systematically investigated.
Nachef, Valérie +2 more
openaire +2 more sources

