Results 121 to 130 of about 15,368 (325)
Remarks on improved inversion attacks on nonlinear filter generators
The subject of this paper are inversion attacks on stream ciphers (nonlinear filter generators), which were first introduced by Golić [3] and extended by Golić, Clark and Dawson [4].
Anna Górska, Karol Górski
doaj +1 more source
Non-Symbolic Fragmentation [PDF]
This paper reports on the use of non-symbolic fragmentation of data for securing communications. Non-symbolic fragmentation, or NSF, relies on breaking up data into non-symbolic fragments, which are (usually irregularly-sized) chunks whose boundaries do ...
Ashman, Helen +4 more
core
Porous Iridium Oxide Inverse Opal Catalysts Enable Efficient PEM Water Electrolysis
Porous iridium‐based inverse opal (IrOx‐IO) structures are introduced as high‐performance, unsupported PEM‐WE anode catalysts. Their electrochemical behavior is analyzed through porosity/surface area tuning, voltage breakdown, and circuit modeling.
Sebastian Möhle +4 more
wiley +1 more source
This review presents a focused and integrated perspective on copper‐based catalysts for the selective electrochemical reduction of CO2 to methanol. It elucidates active site dynamics, mechanistic pathways, and structure–activity relationships, while connecting fundamental insights with catalyst design, reactor engineering, and techno‐economic ...
Debabrata Bagchi +7 more
wiley +1 more source
Stabilizing Frustrated Phase Transitions in Selective Oxidation Reactions
Using multimodal operando spectromicroscopy, the frustrated phase transition responsible for selective oxidation over cobalt oxide spinel catalysts is identified, corresponding to combined surface reaction and Mars‐van Krevelen (MvK) dynamics. This regime is disrupted by the formation of mobile vacancies and the depletion of active oxygen at high ...
Luis Sandoval‐Diaz +11 more
wiley +1 more source
Enhancing the Key Recovery Attack on Round Reduced Salsa
Salsa is the most well-known stream cipher and a finalist of the eSTREAM project. The concept of probabilistic neutral bits (PNBs) first presented by Aumasson et al., is the most important step in the cryptanalysis of Salsa.
Chandan Dey +3 more
doaj +1 more source
Stream cipher based on quasigroup string transformations in $Z_p^*$
In this paper we design a stream cipher that uses the algebraic structure of the multiplicative group $\bbbz_p^*$ (where p is a big prime number used in ElGamal algorithm), by defining a quasigroup of order $p-1$ and by doing quasigroup string ...
Gligoroski, Danilo
core +1 more source
High‐Performance Zero‐Gap Glycerol‐Fed Electrolyzer for C3 Chemicals and Hydrogen Production
This work presents a dynamic, self‐regulating operation strategy that enables selective glycerol electrooxidation in the OER‐free regime, co‐producing C3 chemicals and hydrogen at cell voltages below 1.25 V. Voltage‐ and temperature‐resolved analyses define optimal operating conditions, achieving a sustained current density of 500 mA cm−2 at ∼1.21 V ...
Shayan Angizi +11 more
wiley +1 more source
Generic attacks on small-state stream cipher constructions in the multi-user setting [PDF]
Jianfu Huang +5 more
openalex +1 more source
The selective hydrogenation of acetylene over laterally condensed Pd and Pd–Au catalysts (LCCs) was investigated using operando X‐ray absorption and photoelectron spectroscopy in combination with density functional theory. Pd‐LCCs were found to incorporate significantly more carbon into the metal lattice than Pd–Au LCCs, where the carbon uptake governs
Eylül Öztuna +22 more
wiley +1 more source

