Results 101 to 110 of about 28,850 (320)

The First Review on Nano‐Agricultural Applications of MXene and MBene‐Based Materials for Plant‐Immunoengineering, Controlled Protection, and Inducing Biostimulation Mechanisms

open access: yesAdvanced Materials, EarlyView.
MXene and MBene nanomaterials show significant potential in addressing critical challenges in biomedicine, applied biology, agriculture, and the environment. From a nano‐agricultural perspective, this relatively young field has witnessed emerging advances towards applications for plant‐immunoengineering, biostimulation, and controlled delivery ...
Alireza Rafieerad   +3 more
wiley   +1 more source

Remarks on improved inversion attacks on nonlinear filter generators

open access: yesJournal of Telecommunications and Information Technology, 2003
The subject of this paper are inversion attacks on stream ciphers (nonlinear filter generators), which were first introduced by Golić [3] and extended by Golić, Clark and Dawson [4].
Anna Górska, Karol Górski
doaj   +1 more source

Beyond Presumptions: Toward Mechanistic Clarity in Metal‐Free Carbon Catalysts for Electrochemical H2O2 Production via Data Science

open access: yesAdvanced Materials, EarlyView.
Metal‐free carbon catalysts enable the sustainable synthesis of hydrogen peroxide via two‐electron oxygen reduction; however, active site complexity continues to hinder reliable interpretation. This review critiques correlation‐based approaches and highlights the importance of orthogonal experimental designs, standardized catalyst passports ...
Dayu Zhu   +3 more
wiley   +1 more source

A known plaintext attack on the PKZIP stream cipher [PDF]

open access: yes, 1995
The PKZIP program is one of the more widely used archive/ compression programs on personal computers. It also has many compatible variants on other computers, and is used by most BBS's and ftp sites to compress their archives. PKZIP provides a stream cipher which allows users to scramble files with variable length keys (passwords).
Paul C. Kocher, Eli Biham
openaire   +2 more sources

Heterogenized Copper(II) Phenanthroline Catalysts for Electroreduction of CO2 to C2 Compounds: Substitution on the Ligand Causes Structural Changes to the Molecular Framework and Stability Enhancement

open access: yesAdvanced Materials, EarlyView.
Based on a previously reported binuclear Cu(II) phenanthroline catalyst, a structurally modified version with enhanced stability for electrochemical reduction of CO2 is developed. The second‐generation system allows for stable operation in an MEA electrolyzer with a Faradaic efficiency of >70% for C2 products at elevated current densities.
Na Liu   +12 more
wiley   +1 more source

Multifunctional Bioactive Coatings Based on Bioglass, Vitamin D3, and Melittin Deposited via MAPLE for Enhanced Osseointegration, Antibacterial Activity, and Corrosion Resistance of Titanium Implants

open access: yesAdvanced Materials Interfaces, EarlyView.
Matrix‐Assisted Pulsed Laser Evaporation (MAPLE) technique is used to cover titanium (Ti) substrates with multifunctional bioactive coatings composed of bioglass, vitamin D3, and melittin. Coatings exhibited excellent chemical integrity and favorable micro/nanostructured morphology (promoting cellular adhesion and viability), and a sustained release of
Irina Negut   +9 more
wiley   +1 more source

Enhancing the Key Recovery Attack on Round Reduced Salsa

open access: yesIEEE Access
Salsa is the most well-known stream cipher and a finalist of the eSTREAM project. The concept of probabilistic neutral bits (PNBs) first presented by Aumasson et al., is the most important step in the cryptanalysis of Salsa.
Chandan Dey   +3 more
doaj   +1 more source

Review of algebraic attacks on stream ciphers

open access: yes, 2006
The basic theory and realizing methods of algebraic attacks on stream ciphers are presented.Then the algebraic attacks on stream ciphers with linear feedback shift register and the efficient techniques to decrease the degree of the nonlinear equations system are described in detail.After analyzing the complexity of whole procedures in algebraic attacks,
ZHANG Long1, WU Wen-ling2, WEN Qiao-yan1
openaire   +2 more sources

Home - About - Disclaimer - Privacy