Results 61 to 70 of about 106,304 (243)

Related-key impossible differential attack on a lightweight block cipher MIBS

open access: yesTongxin xuebao, 2014
The strength of MIBS algorithm against the related-key impossible differential attack was examined. MIBS is a lightweight block cipher algorithm.
Ping CHEN, Fu-cheng LIAO, Hong-ru WEI
doaj   +2 more sources

Subspace Trail Cryptanalysis and its Applications to AES

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a ...
Lorenzo Grassi   +2 more
doaj   +1 more source

Capturing information on curves and surfaces from their projected images

open access: yesInternational Journal of Mathematics for Industry, 2020
Obtaining complete information about the shape of an object by looking at it from a single direction is impossible in general. In this paper, we theoretically study obtaining differential geometric information of an object from orthogonal projections in ...
Masaru Hasegawa   +2 more
doaj   +1 more source

A Termite‐Inspired Alternative to Cement

open access: yesAdvanced Functional Materials, EarlyView.
A termite‐inspired composite of clay, cellulose, and lignin forms a dense fibrous network with concrete‐like strength (32 MPa) and superior elasticity, processed at ambient temperature. Abstract Clay combined with organic materials is used by termites as a strong and durable construction material for their mounds with minimal environmental impact. Here,
Oren Regev   +3 more
wiley   +1 more source

New Yoyo Tricks with AES-based Permutations

open access: yesIACR Transactions on Symmetric Cryptology, 2018
In Asiacrypt 2017, Rønjom et al. reported some interesting generic properties of SPNs, leading to what they call the Yoyo trick, and applied it to find the most efficient distinguishers on AES.
Dhiman Saha   +2 more
doaj   +1 more source

Impossible Differential Cryptanalysis on DVB-CSA

open access: yesKSII Transactions on Internet and Information Systems, 2016
The Digital Video Broadcasting-Common Scrambling Algorithm is an ETSI-designated algorithm designed for protecting MPEG-2 signal streams, and it is universally used. Its structure is a typical hybrid symmetric cipher which contains stream part and block part within a symmetric cipher, although the entropy is 64 bits, there haven’t any effective ...
openaire   +1 more source

Three‐dimensional Antimony Sulfide Based Flat Optics

open access: yesAdvanced Functional Materials, EarlyView.
This work presents the development of a grayscale electron beam lithography (g‐EBL) method for fabricating antimony trisulfide (Sb2S3) nanostructures with customizable 3D profiles. The refractive index of g‐EBL patterned Sb2S3 is determined based on the synergy of genetic algorithm and transfer matrix method.
Wei Wang   +18 more
wiley   +1 more source

Smarter Sensors Through Machine Learning: Historical Insights and Emerging Trends across Sensor Technologies

open access: yesAdvanced Functional Materials, EarlyView.
This review highlights how machine learning (ML) algorithms are employed to enhance sensor performance, focusing on gas and physical sensors such as haptic and strain devices. By addressing current bottlenecks and enabling simultaneous improvement of multiple metrics, these approaches pave the way toward next‐generation, real‐world sensor applications.
Kichul Lee   +17 more
wiley   +1 more source

Impossible 4-Tuple Attack: A New Mixture-Based Cryptanalysis Applied to Reduced-Round AES-128

open access: yesIEEE Access
Mixture differential cryptanalysis is a powerful technique for evaluating the robustness of Substitution-Permutation Network (SPN)-structured block ciphers, including the Advanced Encryption Standard (AES).
Masroor Hajari   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy