Results 81 to 90 of about 15,368 (325)

From Waste to Value: Conversion of Calcium Sulfate to Vaterite via Carbon Capture and Storage

open access: yesAdvanced Functional Materials, EarlyView.
This study introduces a new concept for carbon management that relies on the carbonation of industrial gypsum waste and yields phase‐pure vaterite at ambient conditions without any additives. The obtained vaterite is further shown to be a reactive material that develops compressive strength in aqueous suspensions like conventional cements.
Carlos Pimentel   +4 more
wiley   +1 more source

Cryptanalysis of Loiss Stream Cipher-Revisited

open access: yesJournal of Applied Mathematics, 2014
Loiss is a novel byte-oriented stream cipher proposed in 2011. In this paper, based on solving systems of linear equations, we propose an improved Guess and Determine attack on Loiss with a time complexity of 2231 and a data complexity of 268, which ...
Lin Ding   +3 more
doaj   +1 more source

Faster attack on certain stream ciphers

open access: yesElectronics Letters, 1993
A number of keystream generators can be attacked by guessing the contents of one shift register and then checking to see whether this guess is consistent with the observed keystream. Where the target register is n bits long, this gives an attack of complexity 2n−o(1).
openaire   +1 more source

In Materia Shaping of Randomness with a Standard Complementary Metal‐Oxide‐Semiconductor Transistor for Task‐Adaptive Entropy Generation

open access: yesAdvanced Functional Materials, EarlyView.
This study establishes a materials‐driven framework for entropy generation within standard CMOS technology. By electrically rebalancing gate‐oxide traps and Si‐channel defects in foundry‐fabricated FDSOI transistors, the work realizes in‐materia control of temporal correlation – achieving task adaptive entropy optimization for reinforcement learning ...
Been Kwak   +14 more
wiley   +1 more source

Multidimensional linear cryptanalysis [PDF]

open access: yes, 2010
Linear cryptanalysis is an important tool for studying the security of symmetric ciphers. In 1993 Matsui proposed two algorithms, called Algorithm 1 and Algorithm 2, for recovering information about the secret key of a block cipher.
Hermelin, Miia
core  

Comment on "Exposed-Key Weakness of Alpha-Eta" [Phys. Lett. A 370 (2007) 131]

open access: yes, 2008
We show that the insecurity claim of the AlphaEta cryptosystem made by C. Ahn and K. Birnbaum in Phys. Lett. A 370 (2007) 131-135 under heterodyne attack is based on invalid extrapolations of Shannon's random cipher analysis and on an invalid statistical
Ahn   +12 more
core   +1 more source

Toward Scalable Solutions for Silver‐Based Gas Diffusion Electrode Fabrication for the Electrochemical Conversion of CO2 – A Perspective

open access: yesAdvanced Functional Materials, EarlyView.
In this study, the preparation techniques for silver‐based gas diffusion electrodes used for the electrochemical reduction of carbon dioxide (eCO2R) are systematically reviewed and compared with respect to their scalability. In addition, physics‐based and data‐driven modeling approaches are discussed, and a perspective is given on how modeling can aid ...
Simon Emken   +6 more
wiley   +1 more source

Polyferrocene‐Based Cubosomes: Conversion to Magnetic Mesoporous Microparticles, Supramolecular Modification, and Oxidation Response

open access: yesAdvanced Functional Materials, EarlyView.
Polyferrocene block copolymers are synthesized and assembled into micron‐sized polymer cubosomes with double diamond lattice and pore diameter of ≈30 nm. The ferrocene functionality is retained within the polymer cubosome wall as demonstrated on supramolecular modification, and oxidative disassembly.
Chin Ken Wong   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy