Results 61 to 70 of about 106,304 (243)
Related-key impossible differential attack on a lightweight block cipher MIBS
The strength of MIBS algorithm against the related-key impossible differential attack was examined. MIBS is a lightweight block cipher algorithm.
Ping CHEN, Fu-cheng LIAO, Hong-ru WEI
doaj +2 more sources
Subspace Trail Cryptanalysis and its Applications to AES
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a ...
Lorenzo Grassi +2 more
doaj +1 more source
Capturing information on curves and surfaces from their projected images
Obtaining complete information about the shape of an object by looking at it from a single direction is impossible in general. In this paper, we theoretically study obtaining differential geometric information of an object from orthogonal projections in ...
Masaru Hasegawa +2 more
doaj +1 more source
A Termite‐Inspired Alternative to Cement
A termite‐inspired composite of clay, cellulose, and lignin forms a dense fibrous network with concrete‐like strength (32 MPa) and superior elasticity, processed at ambient temperature. Abstract Clay combined with organic materials is used by termites as a strong and durable construction material for their mounds with minimal environmental impact. Here,
Oren Regev +3 more
wiley +1 more source
New Yoyo Tricks with AES-based Permutations
In Asiacrypt 2017, Rønjom et al. reported some interesting generic properties of SPNs, leading to what they call the Yoyo trick, and applied it to find the most efficient distinguishers on AES.
Dhiman Saha +2 more
doaj +1 more source
Impossible Differential Cryptanalysis on DVB-CSA
The Digital Video Broadcasting-Common Scrambling Algorithm is an ETSI-designated algorithm designed for protecting MPEG-2 signal streams, and it is universally used. Its structure is a typical hybrid symmetric cipher which contains stream part and block part within a symmetric cipher, although the entropy is 64 bits, there haven’t any effective ...
openaire +1 more source
Three‐dimensional Antimony Sulfide Based Flat Optics
This work presents the development of a grayscale electron beam lithography (g‐EBL) method for fabricating antimony trisulfide (Sb2S3) nanostructures with customizable 3D profiles. The refractive index of g‐EBL patterned Sb2S3 is determined based on the synergy of genetic algorithm and transfer matrix method.
Wei Wang +18 more
wiley +1 more source
A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis. [PDF]
Azimi SA +5 more
europepmc +1 more source
This review highlights how machine learning (ML) algorithms are employed to enhance sensor performance, focusing on gas and physical sensors such as haptic and strain devices. By addressing current bottlenecks and enabling simultaneous improvement of multiple metrics, these approaches pave the way toward next‐generation, real‐world sensor applications.
Kichul Lee +17 more
wiley +1 more source
Impossible 4-Tuple Attack: A New Mixture-Based Cryptanalysis Applied to Reduced-Round AES-128
Mixture differential cryptanalysis is a powerful technique for evaluating the robustness of Substitution-Permutation Network (SPN)-structured block ciphers, including the Advanced Encryption Standard (AES).
Masroor Hajari +4 more
doaj +1 more source

