Results 91 to 100 of about 15,368 (325)

Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA

open access: yesSensors, 2020
One of the best methods to improve the security of cryptographic systems used to exchange sensitive information is to attack them to find their vulnerabilities and to strengthen them in subsequent designs.
Francisco Eugenio Potestad-Ordóñez   +4 more
doaj   +1 more source

Chiral Nanohoops as an Efficient Spin Polarization System

open access: yesAdvanced Functional Materials, EarlyView.
Chiral conjugated nanohoops with a central dibenzopentalene unit exhibit 90% spin polarization at low voltage and high conductivity. These properties make them ideal components in molecular spintronics applications. Abstract A central challenge in molecular spintronics is to achieve a high spin polarization at low operating voltages and ambient ...
Anu Gupta   +4 more
wiley   +1 more source

Nano‐ and Micro‐Sized Solid Materials Used as Antiviral Agents

open access: yesAdvanced Functional Materials, EarlyView.
Due to the rise of viral infections in humans and possible viral outbreaks, the use of nano‐ or micro‐sized materials as antiviral agents is rapidly increasing. This review explores their antiviral properties against RNA and DNA viruses, either as a prevention or a treatment tool, by delving into their mechanisms of action and how to properly assess ...
Orfeas‐Evangelos Plastiras   +6 more
wiley   +1 more source

Cryptanalysis and improvement of a block cryptographic scheme based on logistic map

open access: yesTongxin xuebao, 2008
Through analyzed of an improved chaotic block cryptographic scheme, it was found that this scheme behaves as a stream cipher indeed and generated keystream is independent with plaintext.
YANG Ji-yun   +3 more
doaj   +2 more sources

Analysis of Atom against quantum attacks

open access: yesIET Quantum Communication
A significant amount of study is being done to review the security promises made for the various ciphers now in use as a result of the development of quantum computing technology.
Ravi Anand, Rimpa Nandi, Takanori Isobe
doaj   +1 more source

Security analysis of linearly filtered NLFSRs

open access: yesJournal of Mathematical Cryptology, 2013
Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of
Orumiehchiha Mohammad Ali   +3 more
doaj   +1 more source

Security enhancement for A5/1 without losing hardware efficiency in future mobile systems [PDF]

open access: yes, 2002
A5/1 is the strong encryption algorithm which protects the air interface of the GSM cellular network. However, in the Fast Software Encryption Workshop 2000 two attacks, the biased birthday attack and the random subgraph attack against A5/1 were ...
Honary, B., Komninos, N.
core  

Dual‐Layer Living Hydrogel Enables On‐Demand Delivery of Phages and Probiotics for Synergistic Wound Infection Therapy

open access: yesAdvanced Functional Materials, EarlyView.
A dual‐layer living hydrogel, ProΦGel, integrates bacteriophages and probiotics for synergistic wound infection therapy. The outer gelatin‐based matrix releases phages on demand in response to P. aeruginosa infections, while inner alginate beads sustain probiotic delivery.
Siyuan Tao   +6 more
wiley   +1 more source

Fault attack on FPGA implementations of Trivium stream cipher

open access: yes2016 IEEE International Symposium on Circuits and Systems (ISCAS), 2016
This article presents the development of an experimental system to introduce faults in Trivium stream ciphers implemented on FPGA. The developed system has made possible to analyze the vulnerability of these implementations against fault attacks. The developed system consists of a mechanism that injects small pulses in the clock signal, and elements ...
Potestad Ordóñez, Francisco Eugenio   +2 more
openaire   +4 more sources

Joint Quantization and Diffusion for Compressed Sensing Measurements of Natural Images

open access: yes, 2014
Recent research advances have revealed the computational secrecy of the compressed sensing (CS) paradigm. Perfect secrecy can also be achieved by normalizing the CS measurement vector.
Lin, Qiuzhen   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy