Results 51 to 60 of about 8,786 (262)

SOFIA : software and control flow integrity architecture [PDF]

open access: yes, 2016
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities, as their failure can lead to injury, damage to equipment, or environmental catastrophe.
Coppens, Bart   +8 more
core   +1 more source

Systematization of a 256-bit lightweight block cipher Marvin [PDF]

open access: yes, 2018
In a world heavily loaded by information, there is a great need for keeping specific information secure from adversaries. The rapid growth in the research field of lightweight cryptography can be seen from the list of the number of lightweight stream as ...
Bhattacharya, Abhishek   +2 more
core   +1 more source

Enhancing Corrosion Resistance and Mechanical Strength of 3D‐Printed Iron Polylactic Acid for Marine Applications via Laser Surface Texturing

open access: yesAdvanced Engineering Materials, EarlyView.
Laser surface texturing significantly improves the corrosion resistance and mechanical strength of 3D‐printed iron polylactic acid (Ir‐PLA) for marine applications. Optimal laser parameters reduce corrosion by 80% and enhance tensile strength by 25% and ductility by 15%.
Mohammad Rezayat   +6 more
wiley   +1 more source

Characterization of Defect Distribution in an Additively Manufactured AlSi10Mg as a Function of Processing Parameters and Correlations with Extreme Value Statistics

open access: yesAdvanced Engineering Materials, EarlyView.
Predicting extreme defects in additive manufacturing remains a key challenge limiting its structural reliability. This study proposes a statistical framework that integrates Extreme Value Theory with advanced process indicators to explore defect–process relationships and improve the estimation of critical defect sizes. The approach provides a basis for
Muhammad Muteeb Butt   +8 more
wiley   +1 more source

Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions

open access: yes, 2013
This article presents a new algorithm to find MDS matrices that are well suited for use as a diffusion layer in lightweight block ciphers. Using an recursive construction, it is possible to obtain matrices with a very compact description. Classical field
Augot, Daniel, Finiasz, Matthieu
core   +2 more sources

Efficient Attack Scheme against SKINNY-64 Based on Algebraic Fault Analysis

open access: yesEntropy, 2023
Lightweight block ciphers are normally used in low-power resource-constrained environments, while providing reliable and sufficient security. Therefore, it is important to study the security and reliability of lightweight block ciphers.
Xing Fang   +4 more
doaj   +1 more source

Experimental Evaluation of 100Cr6 Steel Microindented Surfaces Under Lubricated Nonconformal Point Contacts

open access: yesAdvanced Engineering Materials, EarlyView.
The tribological behavior of 100Cr6 steel spheres textured via Vickers microindentation is evaluated under lubricated sliding by varying both dimple size and density. Fine and dense textures significantly reduce friction across all lubrication regimes, while large dimples increase it.
Farideh Davoodi   +3 more
wiley   +1 more source

Randomness Analysis on Lightweight Block Cipher, PRESENT [PDF]

open access: yesJournal of Computer Science, 2020
Lightweight cryptography is an area of current research conducted by academicians and cryptographic experts to ensure the security of data in limited-resource devices such as RFID tags, medical and health care devices and sensor networks.One of the lightweight algorithms built is the PRESENT algorithm.To this day, PRESENT has been a reference for ...
Isma Norshahila Binti Mohammad Shah   +1 more
openaire   +1 more source

Modified SPECK (M-SPECK) Lightweight Cipher Architecture for Resource-Constrained Applications

open access: yesIEEE Access
The Internet of Things (IoT) devices have grown in recent years and are applied to various fields, with the development of new applications in the automotive industry, health care, agriculture, etc.
R. Mohanapriya, V. Nithish Kumar
doaj   +1 more source

Home - About - Disclaimer - Privacy