Results 41 to 50 of about 10,795 (238)
Thermomechanical fatigue tests of laser beam powder bed fusion (PBF‐LB) Inconel 718 show that the additively manufactured material reaches almost the lifetimes of conventionally‐rolled material under no‐dwell conditions. Introducing dwell times at the maximum temperature markedly reduces the lifetimes due to pronounced grain boundary sliding associated
Stefan Guth +6 more
wiley +1 more source
Electroactive Metal–Organic Frameworks for Electrocatalysis
Electrocatalysis is crucial in sustainable energy conversion as it enables efficient chemical transformations. The review discusses how metal–organic frameworks can revolutionize this field by offering tailorable structures and active site tunability, enabling efficient and selective electrocatalytic processes.
Irena Senkovska +7 more
wiley +1 more source
Many lightweight block ciphers have been proposed for IoT devices that have limited resources. SLIM, LBC-IoT, and SLA are lightweight block ciphers developed for IoT systems.
Nobuyuki Sugio
doaj +1 more source
Cryptanalysis of AES-PRF and Its Dual
A dedicated pseudorandom function (PRF) called AES-PRF was proposed by Mennink and Neves at FSE 2018 (ToSC 2017, Issue 3). AES-PRF is obtained from AES by using the output of the 5-th round as the feed-forward to the output state.
Patrick Derbez +6 more
doaj +1 more source
Impossible differential attack on seven-round AES-128
A specific class of differential cryptanalytic approach, named as impossible differential attack, has been successfully applied to several symmetric cryptographic primitives in particular encryption schemes such as advanced encryption standard (AES). Such attacks exploit differences that are impossible at some intermediate state of the cipher algorithm.
B. Bahrak, M.R. Aref
openaire +1 more source
Bio‐based and (semi‐)synthetic zwitterion‐modified novel materials and fully synthetic next‐generation alternatives show the importance of material design for different biomedical applications. The zwitterionic character affects the physiochemical behavior of the material and deepens the understanding of chemical interaction mechanisms within the ...
Theresa M. Lutz +3 more
wiley +1 more source
On Impossible Boomerang Attacks
The impossible boomerang attack, introduced in 2008 by Jiqiang Lu, is an extension of the impossible differential attack that relies on a boomerang distinguisher of probability 0 for discarding incorrect key guesses.
Xavier Bonnetain +4 more
doaj +1 more source
This study investigates electromechanical PUFs that improve on traditional electric PUFs. The electron transport materials are coated randomly through selective ligand exchange. It produces multiple keys and a key with motion dependent on percolation and strain, and approaches almost ideal inter‐ and intra‐hamming distances.
Seungshin Lim +7 more
wiley +1 more source
Quantum Automated Tools for Finding Impossible Differentials
Due to the superiority of quantum computing, traditional cryptography is facing a severe threat. This makes the security evaluation of cryptographic systems in quantum attack models both significant and urgent.
Huiqin Xie +4 more
doaj +1 more source
Improved Meet-in-the-Middle Attacks on Generic Feistel Constructions
In this paper, we present improved meet-in-the-middle key-recovery attacks on six-round and seven-round Feistel constructions separately. The attacks are based on Guo et al.'s work which appends one round to the five-round distinguisher to attack the six-
Shibin Zhao +4 more
doaj +1 more source

