Results 91 to 100 of about 15,368 (325)
Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA
One of the best methods to improve the security of cryptographic systems used to exchange sensitive information is to attack them to find their vulnerabilities and to strengthen them in subsequent designs.
Francisco Eugenio Potestad-Ordóñez +4 more
doaj +1 more source
Chiral Nanohoops as an Efficient Spin Polarization System
Chiral conjugated nanohoops with a central dibenzopentalene unit exhibit 90% spin polarization at low voltage and high conductivity. These properties make them ideal components in molecular spintronics applications. Abstract A central challenge in molecular spintronics is to achieve a high spin polarization at low operating voltages and ambient ...
Anu Gupta +4 more
wiley +1 more source
Nano‐ and Micro‐Sized Solid Materials Used as Antiviral Agents
Due to the rise of viral infections in humans and possible viral outbreaks, the use of nano‐ or micro‐sized materials as antiviral agents is rapidly increasing. This review explores their antiviral properties against RNA and DNA viruses, either as a prevention or a treatment tool, by delving into their mechanisms of action and how to properly assess ...
Orfeas‐Evangelos Plastiras +6 more
wiley +1 more source
Cryptanalysis and improvement of a block cryptographic scheme based on logistic map
Through analyzed of an improved chaotic block cryptographic scheme, it was found that this scheme behaves as a stream cipher indeed and generated keystream is independent with plaintext.
YANG Ji-yun +3 more
doaj +2 more sources
Analysis of Atom against quantum attacks
A significant amount of study is being done to review the security promises made for the various ciphers now in use as a result of the development of quantum computing technology.
Ravi Anand, Rimpa Nandi, Takanori Isobe
doaj +1 more source
Security analysis of linearly filtered NLFSRs
Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of
Orumiehchiha Mohammad Ali +3 more
doaj +1 more source
Security enhancement for A5/1 without losing hardware efficiency in future mobile systems [PDF]
A5/1 is the strong encryption algorithm which protects the air interface of the GSM cellular network. However, in the Fast Software Encryption Workshop 2000 two attacks, the biased birthday attack and the random subgraph attack against A5/1 were ...
Honary, B., Komninos, N.
core
A dual‐layer living hydrogel, ProΦGel, integrates bacteriophages and probiotics for synergistic wound infection therapy. The outer gelatin‐based matrix releases phages on demand in response to P. aeruginosa infections, while inner alginate beads sustain probiotic delivery.
Siyuan Tao +6 more
wiley +1 more source
Fault attack on FPGA implementations of Trivium stream cipher
This article presents the development of an experimental system to introduce faults in Trivium stream ciphers implemented on FPGA. The developed system has made possible to analyze the vulnerability of these implementations against fault attacks. The developed system consists of a mechanism that injects small pulses in the clock signal, and elements ...
Potestad Ordóñez, Francisco Eugenio +2 more
openaire +4 more sources
Joint Quantization and Diffusion for Compressed Sensing Measurements of Natural Images
Recent research advances have revealed the computational secrecy of the compressed sensing (CS) paradigm. Perfect secrecy can also be achieved by normalizing the CS measurement vector.
Lin, Qiuzhen +3 more
core +1 more source

