Results 91 to 100 of about 28,041 (324)

The Salsa20 Family of Stream Ciphers [PDF]

open access: yes, 2008
Salsa20 is a family of 256-bit stream ciphers designed in 2005 and submitted to eSTREAM, the ECRYPT Stream Cipher Project. Salsa20 has progressed to the third round of eSTREAM without any changes. The 20-round stream cipher Salsa20/20 is consistently faster than AES and is recommended by the designer for typical cryptographic applications.
openaire   +2 more sources

High‐Fidelity Directed Self‐Assembly Using Higher‐χ Polystyrene‐Block‐Poly(Methyl Methacrylate) Derivatives for Dislocation‐Free Sub‐10 nm Features

open access: yesAdvanced Functional Materials, EarlyView.
The relationship between primary polymer structure and pattern quality in the directed self‐assembly of chemically modified polystyrene‐block‐poly(methyl methacrylate) derivatives is explored. The perpendicular lamellae are aligned, with a periodicity below 20 nm. No parallel orientations or dislocations form, and line patterns are well defined over an
Shinsuke Maekawa   +8 more
wiley   +1 more source

Information Theory Based Evaluation of the RC4 Stream Cipher Outputs. [PDF]

open access: yesEntropy (Basel), 2021
Madarro-Capó EJ   +3 more
europepmc   +1 more source

Multidirectionally Patterned Interdigital Transducers for Enhancing Acoustofluidic Streaming with Flexible Printed Circuit Board

open access: yesAdvanced Functional Materials, EarlyView.
A reconfigurable and multidirectional interdigital transducer (M‐IDT) on a flexible printed circuit board provides a practical platform for acoustofluidic research. It simplifies and accelerates prototyping, enabling cost‐effective exploration of wave modes and fluid dynamics.
Mercedes Stringer   +11 more
wiley   +1 more source

Implementation of a Stream Cipher Based on Bernoulli's Map [PDF]

open access: yesarXiv, 2015
A stream cipher was implemented on a FPGA. The keystream, for some authors the most important element, was developed using an algorithm based on Bernoullis chaotic map. When dynamic systems are digitally implemented, a normal degradation appears and disturbs their behavior; for such reason, a mechanism was needed.
arxiv  

Electricity Generation From Ambient Water Evaporation in the Absence of Sunlight via PVA‐Based Porous Hydrogels

open access: yesAdvanced Functional Materials, EarlyView.
In this article, a water‐evaporation driven energy harvester is devised that works even in the absence of sunlight. This is achieved by combining PVA hydrogel with thermoelectrics (TEG) to directly capture energy from water evaporation. Under mild conditions (RH 40%, T of 26 °C, and 2.8 m s−1 wind), 1.71 mW (1.02 W m−2) power can be generated, >3 fold ...
Zichen Gong, Ady Suwardi, Jing Cao
wiley   +1 more source

A Time-Success Ratio Analysis of wPRF-based Leakage-Resilient Stream Ciphers [PDF]

open access: yesarXiv, 2015
Weak pseudorandom functions (wPRFs) found an important application as main building blocks for leakage-resilient ciphers (EUROCRYPT'09). Several security bounds, based on different techniques, were given to these stream ciphers. The security loss in these reduction-based proofs is always polynomial, but has not been studied in detail.
arxiv  

Home - About - Disclaimer - Privacy