Results 61 to 70 of about 147,541 (282)
Cryptanalysis of AES-PRF and Its Dual
A dedicated pseudorandom function (PRF) called AES-PRF was proposed by Mennink and Neves at FSE 2018 (ToSC 2017, Issue 3). AES-PRF is obtained from AES by using the output of the 5-th round as the feed-forward to the output state.
Patrick Derbez +6 more
doaj +1 more source
Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE [PDF]
Subspace trail cryptanalysis is a very recent new cryptanalysis technique, and includes differential, truncated differential, impossible differential, and integral attacks as special cases.
C Beierle +12 more
core +2 more sources
Impossible differential attack on seven-round AES-128
A specific class of differential cryptanalytic approach, named as impossible differential attack, has been successfully applied to several symmetric cryptographic primitives in particular encryption schemes such as advanced encryption standard (AES). Such attacks exploit differences that are impossible at some intermediate state of the cipher algorithm.
B. Bahrak, M.R. Aref
openaire +1 more source
Sustainable Catalyst‐Free PLG Networks: Recyclability, Biodegradability, and Functional Performance
A catalyst‐additive free covalent adaptable network is developed from star‐shaped poly(lactide‐co‐glycolide) cross‐linked with pyromellitic dianhydride, enabling internal carboxylic acid‐driven transesterification. The resulting biodegradable network exhibits mechanical robustness (Young's modulus ≈1.6 GPa), complete recyclability, rapid biodegradation
Lars Schwarzer +2 more
wiley +1 more source
On Impossible Boomerang Attacks
The impossible boomerang attack, introduced in 2008 by Jiqiang Lu, is an extension of the impossible differential attack that relies on a boomerang distinguisher of probability 0 for discarding incorrect key guesses.
Xavier Bonnetain +4 more
doaj +1 more source
We present ultrathin flexible transparent electrodes through iCVD‐enabled molecular control of 10 nm gold films on poly(dimethylaminomethylstyrene). In vivo validation demonstrated photoelectric artifact reduction vs. opaque electrodes and preservation of natural neural dynamics.
Tae Jin Mun +11 more
wiley +1 more source
Quantum Automated Tools for Finding Impossible Differentials
Due to the superiority of quantum computing, traditional cryptography is facing a severe threat. This makes the security evaluation of cryptographic systems in quantum attack models both significant and urgent.
Huiqin Xie +4 more
doaj +1 more source
Improved Meet-in-the-Middle Attacks on Generic Feistel Constructions
In this paper, we present improved meet-in-the-middle key-recovery attacks on six-round and seven-round Feistel constructions separately. The attacks are based on Guo et al.'s work which appends one round to the five-round distinguisher to attack the six-
Shibin Zhao +4 more
doaj +1 more source
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other ...
H., Akshata Shenoy +2 more
core +1 more source
Parallel 3D Bioprinting on SLIPS‐Microarrays
This work introduces the first truly parallel 3D bioprinting method, enabling both the simultaneous fabrication of hundreds of cell laden hydrogel 3D structures and their HTS in individual liquid compartments. By integrating Digital Light Processing (DLP) stereolithography with functional micropatterns, the platform decouples printing time from array ...
Julius von Padberg +3 more
wiley +1 more source

