Results 81 to 90 of about 28,850 (320)
On A Fast Correlation Attack on Certain Stream Ciphers [PDF]
In this paper we present a new algorithm for the recovery of the initial state of a linear feedback shift register when a noisy output sequence is given. Our work is focussed on the investigation of the asymptotical behaviour of the recovery process rather than on the construction of an optimal recovery procedure. Our results show the importance of low-
Vladimir V. Chepyzhov, Ben Smeets
openaire +2 more sources
In this paper, the first use of a siloxane‐substituted silicon phthalocyanine (iso(Si3O)2SiPc) in OTFTs is reported. Moreover, this compound displays the highest hole mobility (exceeding 1 cm2 V−1 s−1) ever recorded for SiPc, and the GIWAXS study reveals thin films with an exceptionally uniform crystalline texture.
Nicolas Ledos +5 more
wiley +1 more source
Reconfigurable 3D Magnetic Nanoarchitectures
This experimental study confirms that 3D magnetic tetrapods grown by focused electron beam‐induced deposition exhibit sequential, controllable magnetization reversal in the individual nanowire legs. The magnetic state of the nanoarchitecture can be controlled individually, on‐demand, through a variation of the direction and magnitude of the applied ...
Sabri Koraltan +8 more
wiley +1 more source
Thermoelectric temperature sensors are developed that directly measure heat changes during optical‐based neural stimulation with millisecond precision. The sensors reveal the temperature windows for safe reversible neural modulation: 1.4–4.5 °C enables reversible neural inhibition, while temperatures above 6.1 °C cause permanent thermal damage.
Junhee Lee +9 more
wiley +1 more source
Stream Ciphers: A Comparative Study of Attacks and Structures
In the latest past, research work has been done in the region of steam ciphers and as a answer of which, several design models for stream ciphers were projected. In Order to appreciate a international standard for data encryption that would prove good in the due course of time, endure the action of cryptanalysis algorithms and reinforce the security ...
Daniyal M. Alghazzawi +2 more
openaire +2 more sources
Droplet Triboelectrification on Liquid‐Like Polymer Brushes
This work investigates the triboelectrification of water droplets on polymer brush‐coated surfaces exhibiting minimal contact line pinning. Such surfaces enable the systematic study of electrode patterning and controlled changes in droplet contact area.
Mohammad Soltani +5 more
wiley +1 more source
Cryptanalysis and improvement of a block cryptographic scheme based on logistic map
Through analyzed of an improved chaotic block cryptographic scheme, it was found that this scheme behaves as a stream cipher indeed and generated keystream is independent with plaintext.
YANG Ji-yun +3 more
doaj +2 more sources
Analysis of Atom against quantum attacks
A significant amount of study is being done to review the security promises made for the various ciphers now in use as a result of the development of quantum computing technology.
Ravi Anand, Rimpa Nandi, Takanori Isobe
doaj +1 more source
Security analysis of linearly filtered NLFSRs
Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of
Orumiehchiha Mohammad Ali +3 more
doaj +1 more source
Polyferrocene block copolymers are synthesized and assembled into micron‐sized polymer cubosomes with double diamond lattice and pore diameter of ≈30 nm. The ferrocene functionality is retained within the polymer cubosome wall as demonstrated on supramolecular modification, and oxidative disassembly.
Chin Ken Wong +4 more
wiley +1 more source

