Results 111 to 120 of about 28,041 (324)

Sono‐Piezo‐Photosynthesis of Ethylene and Acetylene from Bioethanol under Ambient Conditions

open access: yesAdvanced Functional Materials, EarlyView.
A novel sono‐piezo‐photocatalytic strategy enables the conversion of bioethanol to ethylene (C2H4) and acetylene (C2H2) under ambient conditions, addressing the limitations of conventional methods that are high‐temperature and energy‐intensive. By using an advanced graphene oxide/sodium bismuth titanate heterostructure catalyst, this work achieved ...
Yue Jiang   +21 more
wiley   +1 more source

Learning by Test-infecting Symmetric Ciphers [PDF]

open access: yesarXiv, 2006
We describe a novel way in which students can learn the cipher systems without much supervision. In this work we focus on learning symmetric ciphers by altering them using the agile development approach. Two agile approaches the eXtreme Programming (XP) and the closely related Test-Driven Development (TDD) are mentioned or discussed. To facilitate this
arxiv  

A Novel Stream Cipher for Multimedia Security A Novel Stream Cipher for Multimedia Security A Novel Stream Cipher for Multimedia Security A Novel Stream Cipher for Multimedia Security A Novel Stream Cipher for Multimedia Security A Novel Stream Cipher for Multimedia Security A Novel Stream Cipher for Multimedia Security A Novel Stream Cipher for Multimedia Security A Novel Stream Cipher for Multimedia Security A

open access: yesInternational Journal of Engineering and Advanced Technology, 2019
In the last decades the tremendous usage of multimedia data like audio, video and images through communication channels create a need on the security over networks. Since multimedia content utilize large amount of storage for storing images, audio and video, classical cryptographic algorithms such as DES, AES are not efficient in encrypting multimedia ...
P. Vidhya Saraswathi, M. Venkatesulu
openaire   +1 more source

3D (Bio) Printing Combined Fiber Fabrication Methods for Tissue Engineering Applications: Possibilities and Limitations

open access: yesAdvanced Functional Materials, EarlyView.
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana   +2 more
wiley   +1 more source

Cryptanalysis of Loiss Stream Cipher-Revisited

open access: yesJournal of Applied Mathematics, 2014
Loiss is a novel byte-oriented stream cipher proposed in 2011. In this paper, based on solving systems of linear equations, we propose an improved Guess and Determine attack on Loiss with a time complexity of 2231 and a data complexity of 268, which ...
Lin Ding   +3 more
doaj   +1 more source

On the provable security of BEAR and LION schemes [PDF]

open access: yesApplicable Algebra in Engineering, Communication and Computing, 2011, vol. 22, p. 413-423, 2011
BEAR, LION and LIONESS are block ciphers presented by Biham and Anderson (1996), inspired by the famous Luby-Rackoff constructions of block ciphers from other cryptographic primitives (1988). The ciphers proposed by Biham and Anderson are based on one stream cipher and one hash function.
arxiv  

Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications

open access: yesAdvanced Functional Materials, EarlyView.
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai   +8 more
wiley   +1 more source

New Practical Attacks on GEA-1 Based on a New-Found Weakness

open access: yesIET Information Security
GEA-1, a proprietary stream cipher, was initially designed and used to protect against eavesdropping general packet radio service (GPRS) between the phone and the base station.
Zheng Wu   +4 more
doaj   +1 more source

Two Trivial Attacks on A5/1:A GSM Stream Cipher [PDF]

open access: yesarXiv, 2013
Stream ciphers play an important role in those applications where high throughput remains critical and resources are very restricted e.g. in Europe and North America, A5/1 is widely used stream cipher that ensure confidentiality of conversations in GSM mobile phones.
arxiv  

Cryptanalysis of Stream Ciphers with Linear Masking [PDF]

open access: bronze, 2002
Don Coppersmith   +2 more
openalex   +1 more source

Home - About - Disclaimer - Privacy