Results 41 to 50 of about 27,441 (278)
ABSTRACT Drilling fluids used in high‐performance well operations often struggle to maintain rheological stability, colloidal dispersion, and filtration control under harsh downhole conditions. This study engineered a multifunctional Fe3O4@Saponin/Cu(II) nanocomposite to address these challenges.
Kassem Al Attabi +9 more
wiley +1 more source
MRCC: A Practical Covert Channel Over Monero With Provable Security
Covert channels are designed to protect the communication relationship of the sender and receiver. Traditional covert channels have become insecure due to the continuous improvement of traffic analysis techniques. In this context, there is an urgent need
Zhaozhong Guo +3 more
doaj +1 more source
NP-completeness of Certain Sub-classes of the Syndrome Decoding Problem [PDF]
The problem of Syndrome Decoding was proven to be NP-complete in 1978 and, since then, quite a few cryptographic applications have had their security rely on the (provable) difficulty of solving some instances of it. However, in most cases, the instances
Finiasz, Matthieu
core
Operationalizing BioSSbD: A safe‐and‐sustainable‐by‐design framework for biorefineries
Abstract Biorefineries are central to the transition toward a circular bioeconomy; however, their increasing scale and technological heterogeneity, and the integration of biological, chemical, and thermochemical processes introduce complex challenges related to safety, sustainability, and operational reliability. Existing Safe‐and‐Sustainable‐by‐Design
Fernando Ramonet
wiley +1 more source
Abstract Health care is shifting towards a digital‐guided system, integrating digital diagnostics, biomarkers and therapeutics in many care pathways. However, despite rapid technological advancement and preliminary adoption accelerated by the COVID‐19 pandemic, a significant implementation gap persists. This narrative review explores the causes of this
Mees H. P. Stoop +3 more
wiley +1 more source
Provable Secure Generalized Signcryption [PDF]
Generalized signcryption which proposed by Han is a new cryptographic primitive which can work as an en- cryption scheme, a signature scheme or a signcryption scheme[5]. However,the security proof in their paper is uncorrect. our contribution are as following:First we give security notions for this new primitive.Secnond,we give an attack to [4] which ...
Xu an Wang, Xiaoyuan Yang, Jindan Zhang
openaire +1 more source
Abstract Employability remains a critical issue for international students in the United Kingdom. This study adopts the Employability Agency Framework proposed by Pham et al. to explore how a group of international students actively exercised their agency to enhance their employability during their Master's studies in the United Kingdom.
Hoang Nguyen, Ming Cheng
wiley +1 more source
EPN:encryption padding for NTRU with provable security
Known as the fastest public key cryptosystem available now,the provable security of NTRU has not been solved well.an encryption padding,called EPN was designed,for NTRU.Under the full domain one wayness assumption of NTRU,EPN had been proved ...
MU Ning-bo, HU Yu-pu, WANG Bao-cang
doaj +2 more sources
Stronger Security Variants of GCM-SIV
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme that remains secure even if the nonce is repeated.
Tetsu Iwata, Kazuhiko Minematsu
doaj +1 more source
Security of COFB against Chosen Ciphertext Attacks
COFB is a lightweight Authenticated Encryption with Associated Data (AEAD) mode based on block ciphers. It was proposed in CHES 2017 and is the basis for GIFT-COFB, a finalist in the NIST lightweight standardization project.
Mustafa Khairallah
doaj +1 more source

