Results 91 to 100 of about 23,888 (272)

Cryptanalysis of the Vesta-2M stream cipher

open access: yesTongxin xuebao, 2003
The security of stream cipher Vesta-2M used in commercial products in Russia is analyzed. The size of the initial key of the keystream generator of stream cipher Vesta-2M is)2(536O.
GUAN Jie
doaj   +2 more sources

Attack Stream Cipher By Using Cipher System Only

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2017
Attack  stream  cipher  system  , using cipher  text only  , depends on the  characteristics of  plain  teKt language  and  the randomness of  the key , that used  in encryption , without  having detailed  k.nuwh:dgt:: uf cipher algorithm by benefiting  
K. M. Hussein
doaj  

Robust Polymer Hydrogels Improve Electric‐Fish‐Inspired Batteries

open access: yesAdvanced Functional Materials, EarlyView.
ABSTRACT Electric‐fish‐inspired hydrogel batteries based on ion‐concentration gradients offer an attractive route to soft power sources; however, the poor mechanical properties of existing hydrogels limit device assembly and performance. Here, we report poly(ethylene glycol) methyl ether acrylate hydrogels that enable ion‐gradient batteries composed of
Nick Zahnd   +5 more
wiley   +1 more source

Multi‐Scale Interface Engineering of MXenes for Multifunctional Sensory Systems

open access: yesAdvanced Functional Materials, EarlyView.
MXenes, as two‐dimensional transition metal carbides and nitrides, demonstrate remarkable capabilities for multifunctional sensing applications. This review systematically examines multi‐scale interface engineering approaches that enhance sensing performance, enable diverse detection functionalities, and improve system‐level compatibility in MXene ...
Jiaying Liao, Sin‐Yi Pang, Jianhua Hao
wiley   +1 more source

Higher-Order Differential-Linear Cryptanalysis of ChaCha Stream Cipher

open access: yesIEEE Access
This paper studies the advanced methodologies of differential cryptanalysis with a particular emphasis on higher-order differentials and higher-order differential-linear cryptanalysis, along with their application to the ChaCha stream cipher.
Nasratullah Ghafoori, Atsuko Miyaji
doaj   +1 more source

Information Theory Based Evaluation of the RC4 Stream Cipher Outputs. [PDF]

open access: yesEntropy (Basel), 2021
Madarro-Capó EJ   +3 more
europepmc   +1 more source

Optoelectronic Control of Redox Dynamics in POM Memristors for Noise‐Resilient Speech and Hardware‐Level Motion Recognition

open access: yesAdvanced Functional Materials, EarlyView.
Optoelectronic control of redox‐active polyoxometalate clusters in polymer matrices yields hybrid memristors with switchable volatile and non‐volatile modes, enabling reservoir‐type in‐sensor optical preprocessing and stable multilevel synapses for multimodal neuromorphic computing, including noise‐tolerant audiovisual keyword recognition and hardware ...
Xiangyu Ma   +13 more
wiley   +1 more source

Solvent‐Free Manufacturing of Multifunctional Gas Diffusion Electrode Architectures for Enhanced CO2 Conversion From Low‐Concentration Streams

open access: yesAdvanced Functional Materials, EarlyView.
A tandem gas diffusion electrode (GDE) leveraging hierarchically engineered microgranules enables efficient CO2 electroreduction under dilute CO2 conditions. A key innovation lies in the solvent‐free precision assembly of metal–organic‐frameworks, carbon nanotubes, and copper nanoparticles.
Kai‐Jen Wu   +7 more
wiley   +1 more source

New Hybrid Efficient Stream Cipher KeyGenerator Based on LFSR's and Chaotic Map

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences
Communication security that depends on chaos can be considered as a new approach which provides protection and security of communications and maintains confidentiality because Chaos theory can be implemented in cryptosystem successfully.
Dina H. Abbaas, Ayad A. AbdulSalam
doaj   +1 more source

Home - About - Disclaimer - Privacy