Results 41 to 50 of about 13,195 (284)
Stream ciphers are vulnerable to generic time-memory-data tradeoff attacks. These attacks reduce the security level to half of the cipher’s internal state size.
Matthias Hamann +3 more
doaj +1 more source
A New Type of Cipher: DICING_csb [PDF]
In this paper, we will propose a new type of cipher named DICING_csb, which is derived from our previous stream cipher DICING. It has applied a stream of subkey and an encryption form of block ciphers, so it may be viewed as a combinative of stream ...
Li, An-Ping
core +2 more sources
Transparent code authentication at the processor level [PDF]
The authors present a lightweight authentication mechanism that verifies the authenticity of code and thereby addresses the virus and malicious code problems at the hardware level eliminating the need for trusted extensions in the operating system.
A.O. Durahim +32 more
core +2 more sources
Zein‐Based Adhesives: Sustainable Extraction and Application in Bioadhesive Technologies
Zein is extracted from corn gluten meal using a simple and scalable process with high yield (~90%). The resulting protein is applied in bioadhesives modified with Ca2+ and Fe3+ ions, exhibiting substrate‐dependent adhesion. The findings demonstrate competitive bonding performance and highlight the role of ionic interactions in tuning adhesion ...
Paula Bertolino Sanvezzo +3 more
wiley +1 more source
Handbook of Establishing and Maintaining Oxygen‐Free Atmospheres
This study presents a practical framework for creating oxygen‐free atmospheres at ambient pressure using silane‐doped inert gases. The results show that ultra‐low oxygen levels and strongly reduced water content can be achieved through controlled silane dosing, drying systems, and sensor monitoring.
Sascha Jan Zimmermann +3 more
wiley +1 more source
Chaos-Based Image Encryption: Review, Application, and Challenges
Chaos has been one of the most effective cryptographic sources since it was first used in image-encryption algorithms. This paper closely examines the development process of chaos-based image-encryption algorithms from various angles, including symmetric
Bowen Zhang, Lingfeng Liu
doaj +1 more source
Setup‐Optimized Sequencing in Job Shops: Modeling Workstation Productivity and Lateness Behavior
Setup‐optimized sequencing in job‐shop production creates a trade‐off between productivity improvement and schedule reliability. A WIP‐explicit modeling framework links sequencing‐induced productivity gains and lateness dispersion through the production operating curve.
Friederike Stefanowski +2 more
wiley +1 more source
Some remarks on FCSRs and implications for stream ciphers
Feedback with carry shift registers (FCSRs) are extensively discussed in the context of pseudorandom number generation and as building blocks for stream ciphers.
Fischer Simon +2 more
doaj +1 more source
Morpheus: stream cipher for software & hardware applications [PDF]
In a world where electronic devices with different characteristics are networked, privacy is an essential element for the communicating process. Privacy can be achieved by encryption algorithms with unique features based on the application that are ...
Komninos, N.
core
Through direct application of porous transport layer (PTL) on the bipolar plate (BPP) with thermal spraying, the interfacial contact resistance is improved. With the cold gas sprayed BPP–PTL coating system, a proton exchange membrane water electrolysis cell with a cell voltage of Ucell = 1.9 V can be operated up to i = 2.5 A/cm2 in a dynamic mode ...
Kirsten Bobzin +5 more
wiley +1 more source

