Results 81 to 90 of about 15,368 (325)
From Waste to Value: Conversion of Calcium Sulfate to Vaterite via Carbon Capture and Storage
This study introduces a new concept for carbon management that relies on the carbonation of industrial gypsum waste and yields phase‐pure vaterite at ambient conditions without any additives. The obtained vaterite is further shown to be a reactive material that develops compressive strength in aqueous suspensions like conventional cements.
Carlos Pimentel +4 more
wiley +1 more source
Cryptanalysis of Loiss Stream Cipher-Revisited
Loiss is a novel byte-oriented stream cipher proposed in 2011. In this paper, based on solving systems of linear equations, we propose an improved Guess and Determine attack on Loiss with a time complexity of 2231 and a data complexity of 268, which ...
Lin Ding +3 more
doaj +1 more source
A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium [PDF]
Roberto La Scala +3 more
openalex +1 more source
Faster attack on certain stream ciphers
A number of keystream generators can be attacked by guessing the contents of one shift register and then checking to see whether this guess is consistent with the observed keystream. Where the target register is n bits long, this gives an attack of complexity 2n−o(1).
openaire +1 more source
This study establishes a materials‐driven framework for entropy generation within standard CMOS technology. By electrically rebalancing gate‐oxide traps and Si‐channel defects in foundry‐fabricated FDSOI transistors, the work realizes in‐materia control of temporal correlation – achieving task adaptive entropy optimization for reinforcement learning ...
Been Kwak +14 more
wiley +1 more source
An algebraic attack on stream ciphers with application to nonlinear filter generators and WG-PRNG [PDF]
Carla Mascia +2 more
openalex +1 more source
Multidimensional linear cryptanalysis [PDF]
Linear cryptanalysis is an important tool for studying the security of symmetric ciphers. In 1993 Matsui proposed two algorithms, called Algorithm 1 and Algorithm 2, for recovering information about the secret key of a block cipher.
Hermelin, Miia
core
Comment on "Exposed-Key Weakness of Alpha-Eta" [Phys. Lett. A 370 (2007) 131]
We show that the insecurity claim of the AlphaEta cryptosystem made by C. Ahn and K. Birnbaum in Phys. Lett. A 370 (2007) 131-135 under heterodyne attack is based on invalid extrapolations of Shannon's random cipher analysis and on an invalid statistical
Ahn +12 more
core +1 more source
In this study, the preparation techniques for silver‐based gas diffusion electrodes used for the electrochemical reduction of carbon dioxide (eCO2R) are systematically reviewed and compared with respect to their scalability. In addition, physics‐based and data‐driven modeling approaches are discussed, and a perspective is given on how modeling can aid ...
Simon Emken +6 more
wiley +1 more source
Polyferrocene block copolymers are synthesized and assembled into micron‐sized polymer cubosomes with double diamond lattice and pore diameter of ≈30 nm. The ferrocene functionality is retained within the polymer cubosome wall as demonstrated on supramolecular modification, and oxidative disassembly.
Chin Ken Wong +4 more
wiley +1 more source

