Results 61 to 70 of about 13,195 (284)

Security analysis of linearly filtered NLFSRs

open access: yesJournal of Mathematical Cryptology, 2013
Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of
Orumiehchiha Mohammad Ali   +3 more
doaj   +1 more source

Impact of Pre‐Oxidation Treatments on a Recycled MgO/Steel‐Composite as Carbon Free Anode in Aluminum‐Electrolysis Environments

open access: yesAdvanced Engineering Materials, EarlyView.
Cermets (60 vol.% AISI 316L stainless steel, 40 vol.% recycled MgO), intended for use in aluminum electrolysis, were pre‐oxidized in three furnaces with different heating technologies and subjected to a cryolite corrosion test. The different atmospheres influenced the formation of oxide layers, which in turn affected corrosion resistance and ...
Patricia Kaiser   +4 more
wiley   +1 more source

Additive Manufacturing of Continuous Fibre Reinforced Composites: Process, Characterisation, Modelling, and Sustainability

open access: yesAdvanced Engineering Materials, EarlyView.
Additive manufacturing provides precise control over the placement of continuous fibres within polymer matrices, enabling customised mechanical performance in composite components. This article explores processing strategies, mechanical testing, and modelling approaches for additive manufactured continuous fibre‐reinforced composites.
Cherian Thomas, Amir Hosein Sakhaei
wiley   +1 more source

Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?

open access: yesIACR Transactions on Symmetric Cryptology, 2019
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, they are shown to be powerful against Trivium-like ciphers.
Chen-Dong Ye, Tian Tian
doaj   +1 more source

Fostering Innovation: Streamlining Magnetocaloric Materials Research by Digitalization

open access: yesAdvanced Engineering Materials, EarlyView.
Magnetocaloric cooling (MCE) is an environmentally friendly refrigeration method with great potential. Optimizing MCE materials involves the preparation and screening of large quantities of samples, which in turn generates a large amount of data. A digitalization approach is presented that uses ontologies, knowledge graphs, and digital workflows to ...
Simon Bekemeier   +17 more
wiley   +1 more source

Enhancement of Stream Cipher by Using Variant Register in Length

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2017
         Stream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed.
N. A. Taha
doaj  

Turing: A Fast Stream Cipher [PDF]

open access: yes, 2003
This paper proposes the Turing stream cipher. Turing offers up to 256-bit key strength, and is designed for extremely efficient software implementation.It combines an LFSR generator based on that of SOBER [21] with a keyed mixing function reminiscent of a block cipher round. Aspects of the block mixer round have been derived from Rijndael [6], Twofish [
Gregory G. Rose, Philip Hawkes
openaire   +2 more sources

Exploring Dipolar Dynamics and Ionic Transport in Metal‐Organic Frameworks: Experimental and Theoretical Insights

open access: yesAdvanced Functional Materials, EarlyView.
In this study, the interplay of dipolar dynamics and ionic charge transport in MOF compounds is investigated. Synthesizing the novel structure CFA‐25 with integrated freely rotating dipolar groups, local and macroscopic effects, including interactions with Cs cations are explored.
Ralph Freund   +6 more
wiley   +1 more source

The Switching Generator: New Clock-Controlled Generator with Resistance against the Algebraic and Side Channel Attacks

open access: yesEntropy, 2015
Since Advanced Encryption Standard (AES) in stream modes, such as counter (CTR), output feedback (OFB) and cipher feedback (CFB), can meet most industrial requirements, the range of applications for dedicated stream ciphers is decreasing.
Jun Choi   +3 more
doaj   +1 more source

A Novel Latin Square Image Cipher

open access: yes, 2012
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson   +45 more
core   +1 more source

Home - About - Disclaimer - Privacy