Results 51 to 60 of about 15,909 (208)

TreeSpider: In‐Canopy Exploration With Tether‐Based Aerial Modular Arms

open access: yesAdvanced Robotics Research, EarlyView.
A tethered drone with perching arms and a 360° ring enables unprecedented maneuverability within dense forest canopies. By dynamically adjusting tether length and decoupling pitch from the frame, it navigates between branches, senses multiple trees, and interacts physically with foliage.
Luca Romanello   +7 more
wiley   +1 more source

Cryptanalysis of PMACx, PMAC2x, and SIVx

open access: yesIACR Transactions on Symmetric Cryptology, 2017
At CT-RSA 2017, List and Nandi proposed two variable input length pseudorandom functions (VI-PRFs) called PMACx and PMAC2x, and a deterministic authenticated encryption scheme called SIVx.
Kazuhiko Minematsu, Tetsu Iwata
doaj   +1 more source

ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode

open access: yesIACR Transactions on Symmetric Cryptology, 2020
NIST has recently initiated a standardization project for efficient lightweight authenticated encryption schemes. SUNDAE, a candidate in this project, achieves optimal state size which results in low circuit overhead on top of the underlying block cipher.
Avik Chakraborti   +5 more
doaj   +1 more source

Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression [PDF]

open access: yes, 2015
International audienceIn typical applications of homomorphic encryption, the first step consists for Alice to encrypt some plaintext m under Bob’s public key pk and to send the ciphertext c = HEpk(m) to some third-party evaluator Charlie.
Canteaut, Anne   +6 more
core   +6 more sources

Microscale Mapping of Fiber Strain and Damage in Composite Wrinkled Laminates Using Computed Tomography Assisted Wide‐Angle X‐Ray Scattering

open access: yesAdvanced Science, EarlyView.
This study combines full‐field tomography with diffraction mapping to quantify radial (ε002$\varepsilon _{002}$) and axial (ε100$\varepsilon _{100}$) lattice strain in wrinkled carbon‐fiber specimens for the first time. Radial microstrain gradients (−14.5 µεMPa$\varepsilon \mathrm{MPa}$−1) are found to signal damage‐prone zones ahead of failure, which ...
Hoang Minh Luong   +7 more
wiley   +1 more source

Mini-ciphers: a reliable testbed for cryptanalysis? [PDF]

open access: yes, 2009
This paper reports on higher-order square analysis of the AES cipher. We present experimental results of attack simulations on mini-AES versions with word sizes of 3, 4, 5, 6 and 7 bits and describe the propagation of higher-order Lambda-sets inside some
Nakahara, Jorge   +1 more
core   +1 more source

Co‐Treatment With rhBMP‐2 and Rapamycin Modulates Osteogenesis–Adipogenesis Balance to Enhance Aged Bone Regeneration

open access: yesAdvanced Science, EarlyView.
This study demonstrates that the imbalance between osteogenic and adipogenic differentiation in senescent BMSCs, leading to excessive adipocyte accumulation, which subsequently impairs bone regeneration in aged mice. To address this pathological dysregulation, a novel energy‐supplying hydrogel system (PBR) has been developed to restore balanced ...
Zirui He   +7 more
wiley   +1 more source

Provably Quantum-Secure Message Authentication Code [PDF]

open access: yes, 2022
Die Gefahr von Quantencomputer gegen asymmetrische Kryptographie ist schon lange bekannt. Jedoch wurden die Auswirkungen auf die symmetrische Kryptographie als weniger einschlägig betrachtet. In den letzten Jahren sind mehrere effiziente Quantenangriffee
Nguyen, Jérôme
core   +2 more sources

Accelerated Screening of Halide Double Perovskites via Hybrid Density Functional Theory and Machine Learning for Thermoelectric Energy Conversion

open access: yesAdvanced Energy and Sustainability Research, EarlyView.
This study integrates hybrid density functional theory, Boltzmann transport theory, and machine learning to accelerate the discovery of lead‐free halide double perovskites for thermoelectric energy conversion. By screening 102 compounds, the authors identify high‐performing candidates such as Rb2GeI6 and Cs2SnBr6, offering a sustainable pathway toward ...
Souraya Goumri‐Said   +2 more
wiley   +1 more source

Comprehensive security analysis of CRAFT

open access: yesIACR Transactions on Symmetric Cryptology, 2020
CRAFT is a lightweight block cipher, designed to provide efficient protection against differential fault attacks. It is a tweakable cipher that includes 32 rounds to produce a ciphertext from a 64-bit plaintext using a 128-bit key and 64-bit public tweak.
Hosein Hadipour   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy