Results 51 to 60 of about 15,909 (208)
TreeSpider: In‐Canopy Exploration With Tether‐Based Aerial Modular Arms
A tethered drone with perching arms and a 360° ring enables unprecedented maneuverability within dense forest canopies. By dynamically adjusting tether length and decoupling pitch from the frame, it navigates between branches, senses multiple trees, and interacts physically with foliage.
Luca Romanello +7 more
wiley +1 more source
Cryptanalysis of PMACx, PMAC2x, and SIVx
At CT-RSA 2017, List and Nandi proposed two variable input length pseudorandom functions (VI-PRFs) called PMACx and PMAC2x, and a deterministic authenticated encryption scheme called SIVx.
Kazuhiko Minematsu, Tetsu Iwata
doaj +1 more source
ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode
NIST has recently initiated a standardization project for efficient lightweight authenticated encryption schemes. SUNDAE, a candidate in this project, achieves optimal state size which results in low circuit overhead on top of the underlying block cipher.
Avik Chakraborti +5 more
doaj +1 more source
Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression [PDF]
International audienceIn typical applications of homomorphic encryption, the first step consists for Alice to encrypt some plaintext m under Bob’s public key pk and to send the ciphertext c = HEpk(m) to some third-party evaluator Charlie.
Canteaut, Anne +6 more
core +6 more sources
This study combines full‐field tomography with diffraction mapping to quantify radial (ε002$\varepsilon _{002}$) and axial (ε100$\varepsilon _{100}$) lattice strain in wrinkled carbon‐fiber specimens for the first time. Radial microstrain gradients (−14.5 µεMPa$\varepsilon \mathrm{MPa}$−1) are found to signal damage‐prone zones ahead of failure, which ...
Hoang Minh Luong +7 more
wiley +1 more source
Mini-ciphers: a reliable testbed for cryptanalysis? [PDF]
This paper reports on higher-order square analysis of the AES cipher. We present experimental results of attack simulations on mini-AES versions with word sizes of 3, 4, 5, 6 and 7 bits and describe the propagation of higher-order Lambda-sets inside some
Nakahara, Jorge +1 more
core +1 more source
This study demonstrates that the imbalance between osteogenic and adipogenic differentiation in senescent BMSCs, leading to excessive adipocyte accumulation, which subsequently impairs bone regeneration in aged mice. To address this pathological dysregulation, a novel energy‐supplying hydrogel system (PBR) has been developed to restore balanced ...
Zirui He +7 more
wiley +1 more source
Provably Quantum-Secure Message Authentication Code [PDF]
Die Gefahr von Quantencomputer gegen asymmetrische Kryptographie ist schon lange bekannt. Jedoch wurden die Auswirkungen auf die symmetrische Kryptographie als weniger einschlägig betrachtet. In den letzten Jahren sind mehrere effiziente Quantenangriffee
Nguyen, Jérôme
core +2 more sources
This study integrates hybrid density functional theory, Boltzmann transport theory, and machine learning to accelerate the discovery of lead‐free halide double perovskites for thermoelectric energy conversion. By screening 102 compounds, the authors identify high‐performing candidates such as Rb2GeI6 and Cs2SnBr6, offering a sustainable pathway toward ...
Souraya Goumri‐Said +2 more
wiley +1 more source
Comprehensive security analysis of CRAFT
CRAFT is a lightweight block cipher, designed to provide efficient protection against differential fault attacks. It is a tweakable cipher that includes 32 rounds to produce a ciphertext from a 64-bit plaintext using a 128-bit key and 64-bit public tweak.
Hosein Hadipour +4 more
doaj +1 more source

