Results 61 to 70 of about 257,742 (291)

Security of signed ELGamal encryption [PDF]

open access: yes, 2005
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against the adaptive chosen ciphertext attack, in which an attacker can freely use
Jakobsson, Markus, Schnorr, Claus Peter
core  

Efficient public-key cryptography with bounded leakage and tamper resilience [PDF]

open access: yes, 2016
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks.
A Faonio   +46 more
core   +2 more sources

Roadmap to Precision 3D Printing of Cellulose: Rheology‐Guided Formulation, Fidelity Assessment, and Application Horizons

open access: yesAdvanced Materials Technologies, EarlyView.
This critical review presents a comprehensive roadmap for the precision 3D printing of cellulose. Quantitative correlations link ink formulation and rheological properties to print fidelity and final material performance. This framework guides the development of advanced functional materials, from biomedical scaffolds to electromagnetic shielding ...
Majed Amini   +3 more
wiley   +1 more source

Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We devise the first closed formula for the number of rounds of a blockcipher with secret components so that these components can be revealed using multiset, algebraic-degree, or division-integral properties, which in this case are equivalent.
Alex Biryukov   +2 more
doaj   +1 more source

Online Template Attacks: Revisited

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
An online template attack (OTA) is a powerful technique previously used to attack elliptic curve scalar multiplication algorithms. This attack has only been analyzed in the realm of power consumption and EM side channels, where the signals leak related ...
Alejandro Cabrera Aldaya   +1 more
doaj   +1 more source

Model-Based Generation of Attack-Fault Trees

open access: yes, 2023
Joint safety and security analysis of cyber-physical systems is a necessary step to correctly capture inter-dependencies between these properties. Attack-Fault Trees represent a combination of dynamic Fault Trees and Attack Trees and can be used to model and model-check a holistic view on both safety and security.
Raffaela Groner   +7 more
openaire   +3 more sources

Multimodal Locomotion in Insect‐Inspired Microrobots: A Review of Strategies for Aerial, Surface, Aquatic, and Interfacial Motion

open access: yesAdvanced Robotics Research, EarlyView.
This review identifies key design considerations for insect‐inspired microrobots capable of multimodal locomotion. To draw inspiration, biological and robotic strategies for moving in air, on water surfaces, and underwater are examined, along with approaches for crossing the air–water interface.
Mija Jovchevska   +2 more
wiley   +1 more source

Computational Modeling of Dynamic Stability Derivatives for Generic Airfoils

open access: yesMATEC Web of Conferences, 2017
This paper presents a method for the computation of the static and dynamic stability derivatives of generic airfoils using high fidelity Computational Fluid Dynamics.
Mumtaz Muhammad Saleem   +2 more
doaj   +1 more source

Gut Microbiota‐Derived Anandamide Mediates the Therapeutic Effects of Urolithin A on Alcohol‐Induced Cognitive and Social Dysfunction via CB1R‐DRD2‐RAP1 Signaling Axis

open access: yesAdvanced Science, EarlyView.
This study reveals that Urolithin A (UA) counteracts alcohol‐induced cognitive and social dysfunction (AICSD) via a gut microbiome‐dependent mechanism. UA‐enriched Bacteroids sartorii and Parabacteroids distasonis elevate anandamide (AEA), which activates the CB1R‐DRD2‐Rap1 signaling cascade to drive synaptic repair and reduce neuroinflammation ...
Hongbo Zhang   +9 more
wiley   +1 more source

Differential Attacks on Generalized Feistel Schemes [PDF]

open access: yes, 2013
While generic attacks on classical Feistel schemes and unbalanced Feistel schemes have been studied a lot, generic attacks on several generalized Feistel schemes like type-1, type-2 and type-3 and alternating Feistel schemes, as defined in [8], have not been systematically investigated.
Nachef, Valérie   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy