Results 41 to 50 of about 10,795 (238)

Thermomechanical Fatigue and Creep–Fatigue Interaction of Inconel 718 Additively Manufactured by Laser Beam Powder Bed Fusion

open access: yesAdvanced Engineering Materials, EarlyView.
Thermomechanical fatigue tests of laser beam powder bed fusion (PBF‐LB) Inconel 718 show that the additively manufactured material reaches almost the lifetimes of conventionally‐rolled material under no‐dwell conditions. Introducing dwell times at the maximum temperature markedly reduces the lifetimes due to pronounced grain boundary sliding associated
Stefan Guth   +6 more
wiley   +1 more source

Electroactive Metal–Organic Frameworks for Electrocatalysis

open access: yesAdvanced Functional Materials, EarlyView.
Electrocatalysis is crucial in sustainable energy conversion as it enables efficient chemical transformations. The review discusses how metal–organic frameworks can revolutionize this field by offering tailorable structures and active site tunability, enabling efficient and selective electrocatalytic processes.
Irena Senkovska   +7 more
wiley   +1 more source

Bit-Based Evaluation of Lightweight Block Ciphers SLIM, LBC-IoT, and SLA by Mixed Integer Linear Programming

open access: yesIET Information Security
Many lightweight block ciphers have been proposed for IoT devices that have limited resources. SLIM, LBC-IoT, and SLA are lightweight block ciphers developed for IoT systems.
Nobuyuki Sugio
doaj   +1 more source

Cryptanalysis of AES-PRF and Its Dual

open access: yesIACR Transactions on Symmetric Cryptology, 2018
A dedicated pseudorandom function (PRF) called AES-PRF was proposed by Mennink and Neves at FSE 2018 (ToSC 2017, Issue 3). AES-PRF is obtained from AES by using the output of the 5-th round as the feed-forward to the output state.
Patrick Derbez   +6 more
doaj   +1 more source

Impossible differential attack on seven-round AES-128

open access: yesIET Information Security, 2008
A specific class of differential cryptanalytic approach, named as impossible differential attack, has been successfully applied to several symmetric cryptographic primitives in particular encryption schemes such as advanced encryption standard (AES). Such attacks exploit differences that are impossible at some intermediate state of the cipher algorithm.
B. Bahrak, M.R. Aref
openaire   +1 more source

Smart, Bio‐Inspired Polymers and Bio‐Based Molecules Modified by Zwitterionic Motifs to Design Next‐Generation Materials for Medical Applications

open access: yesAdvanced Functional Materials, EarlyView.
Bio‐based and (semi‐)synthetic zwitterion‐modified novel materials and fully synthetic next‐generation alternatives show the importance of material design for different biomedical applications. The zwitterionic character affects the physiochemical behavior of the material and deepens the understanding of chemical interaction mechanisms within the ...
Theresa M. Lutz   +3 more
wiley   +1 more source

On Impossible Boomerang Attacks

open access: yesIACR Transactions on Symmetric Cryptology
The impossible boomerang attack, introduced in 2008 by Jiqiang Lu, is an extension of the impossible differential attack that relies on a boomerang distinguisher of probability 0 for discarding incorrect key guesses.
Xavier Bonnetain   +4 more
doaj   +1 more source

Complex Cryptographic and User‐Centric Physically Unclonable Functions Enabled by Strain‐Sensitive Nanocrystals via Selective Ligand Exchange

open access: yesAdvanced Functional Materials, EarlyView.
This study investigates electromechanical PUFs that improve on traditional electric PUFs. The electron transport materials are coated randomly through selective ligand exchange. It produces multiple keys and a key with motion dependent on percolation and strain, and approaches almost ideal inter‐ and intra‐hamming distances.
Seungshin Lim   +7 more
wiley   +1 more source

Quantum Automated Tools for Finding Impossible Differentials

open access: yesMathematics
Due to the superiority of quantum computing, traditional cryptography is facing a severe threat. This makes the security evaluation of cryptographic systems in quantum attack models both significant and urgent.
Huiqin Xie   +4 more
doaj   +1 more source

Improved Meet-in-the-Middle Attacks on Generic Feistel Constructions

open access: yesIEEE Access, 2019
In this paper, we present improved meet-in-the-middle key-recovery attacks on six-round and seven-round Feistel constructions separately. The attacks are based on Guo et al.'s work which appends one round to the five-round distinguisher to attack the six-
Shibin Zhao   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy