Results 21 to 30 of about 34,466 (227)
New Results on Boomerang and Rectangle Attacks [PDF]
The boomerang attack is a new and very powerful cryptanalytic technique. However, due to the adaptive chosen plaintext and ciphertext nature of the attack, boomerang key recovery attacks that retrieve key material on both sides of the boomerang distinguisher are hard to mount.
Eli Biham, Orr Dunkelman, Nathan Keller
openaire +1 more source
Improvement of the robustness on geographical networks by adding shortcuts [PDF]
In a topological structure affected by geographical constraints on liking, the connectivity is weakened by constructing local stubs with small cycles, a something of randomness to bridge them is crucial for the robust network design.
Albert +29 more
core +3 more sources
Differential Cryptanalysis of Round-Reduced Sparx-64/128 [PDF]
Sparx is a family of ARX-based block ciphers designed according to the long-trail strategy (LTS) that were both introduced by Dinu et al. at ASIACRYPT'16.
Ankele, Ralph, List, Eik
core +2 more sources
A numerical simulation was performed to investigate the effects of longitudinal vortices on the heat transfer enhancement of a laminar flow in a rectangle duct mounted with rectangular winglet pair on the bottom wall.
Qiang Zhang, Liang-Bi Wang
doaj +1 more source
Underwater detection of dangerous substances: status the SABAT project [PDF]
The Neutron Activation Analysis (NAA) plays an exceptional role in the modern nuclear engineering, especially in detection of hazardous substances. However, in the aquatic environment, there are still many problems to be solved for effective usage of ...
Moskal, P. +5 more
core +2 more sources
SOFIA : software and control flow integrity architecture [PDF]
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities, as their failure can lead to injury, damage to equipment, or environmental catastrophe.
Coppens, Bart +8 more
core +1 more source
Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode [PDF]
In this paper we investigate the security of the encryption mode of the HAS-160 hash function. HAS-160 is a Korean hash standard which is widely used in Korean industry. The structure of HAS-160 is similar to SHA-1 besides some modifications. In this paper, we present the first cryptographic attack that breaks the encryption mode of the full 80-round ...
Orr Dunkelman +3 more
openaire +2 more sources
A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers
In this article, we provide the first independent security analysis of Deoxys, a third-round authenticated encryption candidate of the CAESAR competition, and its internal tweakable block ciphers Deoxys-BC-256 and Deoxys-BC-384.
Carlos Cid +4 more
doaj +1 more source
IC-integrated flexible shear-stress sensor skin [PDF]
This paper reports the successful development of the first IC-integrated flexible MEMS shear-stress sensor skin. The sensor skin is 1 cm wide, 2 cm long, and 70 /spl mu/m thick. It contains 16 shear-stress sensors, which are arranged in a 1-D array, with
Ho, Chih-Ming +3 more
core +1 more source
Fair and Square: Cake-Cutting in Two Dimensions
We consider the classic problem of fairly dividing a heterogeneous good ("cake") among several agents with different valuations. Classic cake-cutting procedures either allocate each agent a collection of disconnected pieces, or assume that the cake is a ...
Aumann, Yonatan +3 more
core +1 more source

