Results 91 to 100 of about 23,888 (272)
Cryptanalysis of the Vesta-2M stream cipher
The security of stream cipher Vesta-2M used in commercial products in Russia is analyzed. The size of the initial key of the keystream generator of stream cipher Vesta-2M is)2(536O.
GUAN Jie
doaj +2 more sources
Attack Stream Cipher By Using Cipher System Only
Attack stream cipher system , using cipher text only , depends on the characteristics of plain teKt language and the randomness of the key , that used in encryption , without having detailed k.nuwh:dgt:: uf cipher algorithm by benefiting
K. M. Hussein
doaj
Robust Polymer Hydrogels Improve Electric‐Fish‐Inspired Batteries
ABSTRACT Electric‐fish‐inspired hydrogel batteries based on ion‐concentration gradients offer an attractive route to soft power sources; however, the poor mechanical properties of existing hydrogels limit device assembly and performance. Here, we report poly(ethylene glycol) methyl ether acrylate hydrogels that enable ion‐gradient batteries composed of
Nick Zahnd +5 more
wiley +1 more source
Multi‐Scale Interface Engineering of MXenes for Multifunctional Sensory Systems
MXenes, as two‐dimensional transition metal carbides and nitrides, demonstrate remarkable capabilities for multifunctional sensing applications. This review systematically examines multi‐scale interface engineering approaches that enhance sensing performance, enable diverse detection functionalities, and improve system‐level compatibility in MXene ...
Jiaying Liao, Sin‐Yi Pang, Jianhua Hao
wiley +1 more source
Higher-Order Differential-Linear Cryptanalysis of ChaCha Stream Cipher
This paper studies the advanced methodologies of differential cryptanalysis with a particular emphasis on higher-order differentials and higher-order differential-linear cryptanalysis, along with their application to the ChaCha stream cipher.
Nasratullah Ghafoori, Atsuko Miyaji
doaj +1 more source
Information Theory Based Evaluation of the RC4 Stream Cipher Outputs. [PDF]
Madarro-Capó EJ +3 more
europepmc +1 more source
Optoelectronic control of redox‐active polyoxometalate clusters in polymer matrices yields hybrid memristors with switchable volatile and non‐volatile modes, enabling reservoir‐type in‐sensor optical preprocessing and stable multilevel synapses for multimodal neuromorphic computing, including noise‐tolerant audiovisual keyword recognition and hardware ...
Xiangyu Ma +13 more
wiley +1 more source
A tandem gas diffusion electrode (GDE) leveraging hierarchically engineered microgranules enables efficient CO2 electroreduction under dilute CO2 conditions. A key innovation lies in the solvent‐free precision assembly of metal–organic‐frameworks, carbon nanotubes, and copper nanoparticles.
Kai‐Jen Wu +7 more
wiley +1 more source
New Hybrid Efficient Stream Cipher KeyGenerator Based on LFSR's and Chaotic Map
Communication security that depends on chaos can be considered as a new approach which provides protection and security of communications and maintains confidentiality because Chaos theory can be implemented in cryptosystem successfully.
Dina H. Abbaas, Ayad A. AbdulSalam
doaj +1 more source
Encryption method and security analysis of medical images based on stream cipher enhanced logical mapping. [PDF]
Liu S, Liu L, Pang M.
europepmc +1 more source

