Results 111 to 120 of about 28,041 (324)
Sono‐Piezo‐Photosynthesis of Ethylene and Acetylene from Bioethanol under Ambient Conditions
A novel sono‐piezo‐photocatalytic strategy enables the conversion of bioethanol to ethylene (C2H4) and acetylene (C2H2) under ambient conditions, addressing the limitations of conventional methods that are high‐temperature and energy‐intensive. By using an advanced graphene oxide/sodium bismuth titanate heterostructure catalyst, this work achieved ...
Yue Jiang+21 more
wiley +1 more source
Learning by Test-infecting Symmetric Ciphers [PDF]
We describe a novel way in which students can learn the cipher systems without much supervision. In this work we focus on learning symmetric ciphers by altering them using the agile development approach. Two agile approaches the eXtreme Programming (XP) and the closely related Test-Driven Development (TDD) are mentioned or discussed. To facilitate this
arxiv
In the last decades the tremendous usage of multimedia data like audio, video and images through communication channels create a need on the security over networks. Since multimedia content utilize large amount of storage for storing images, audio and video, classical cryptographic algorithms such as DES, AES are not efficient in encrypting multimedia ...
P. Vidhya Saraswathi, M. Venkatesulu
openaire +1 more source
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana+2 more
wiley +1 more source
Cryptanalysis of Loiss Stream Cipher-Revisited
Loiss is a novel byte-oriented stream cipher proposed in 2011. In this paper, based on solving systems of linear equations, we propose an improved Guess and Determine attack on Loiss with a time complexity of 2231 and a data complexity of 268, which ...
Lin Ding+3 more
doaj +1 more source
On the provable security of BEAR and LION schemes [PDF]
BEAR, LION and LIONESS are block ciphers presented by Biham and Anderson (1996), inspired by the famous Luby-Rackoff constructions of block ciphers from other cryptographic primitives (1988). The ciphers proposed by Biham and Anderson are based on one stream cipher and one hash function.
arxiv
Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai+8 more
wiley +1 more source
New Practical Attacks on GEA-1 Based on a New-Found Weakness
GEA-1, a proprietary stream cipher, was initially designed and used to protect against eavesdropping general packet radio service (GPRS) between the phone and the base station.
Zheng Wu+4 more
doaj +1 more source
Two Trivial Attacks on A5/1:A GSM Stream Cipher [PDF]
Stream ciphers play an important role in those applications where high throughput remains critical and resources are very restricted e.g. in Europe and North America, A5/1 is widely used stream cipher that ensure confidentiality of conversations in GSM mobile phones.
arxiv
Cryptanalysis of Stream Ciphers with Linear Masking [PDF]
Don Coppersmith+2 more
openalex +1 more source