Results 71 to 80 of about 15,909 (208)
HALFLOOP-24 is a tweakable block cipher that is used to protect automatic link establishment messages in high frequency radio, a technology commonly used by government agencies and industries that need highly robust long-distance communications.
Marcus Dansarie +3 more
doaj +1 more source
Extended Generalized Feistel Networks using Matrix Representation [PDF]
International audienceWhile Generalized Feistel Networks have been widely studied in the literature as a building block of a block cipher, we propose in this paper a unified vision to easily represent them through a matrix representation. We then propose
A Biryukov +23 more
core +3 more sources
This work proposes a high‐fidelity, simulation‐driven control framework for robust grid integration of hybrid PV–wind systems using a modular, hierarchical multi‐loop architecture with adaptive decision logic. The framework coordinates power, DC‐link voltage, and grid currents under fast load and generation changes, enabling safe exploration of extreme
Wulfran Fendzi Mbasso +5 more
wiley +1 more source
Electrocatalytic water splitting with carbon nitride (CxNy) materials has gained attention due to their synthesis, structure, and robust application. Among various CxNy types, g‐C3N4 is the most stable allotrope and extensively researched. This review explores recent advances in HER, OER, and OWS, focusing on defect engineering, structural engineering,
Zi Wei Tan +4 more
wiley +1 more source
Improved meet‐in‐the‐middle attacks on reduced‐round Joltik‐BC
Joltik‐BC is an internal tweakable block cipher of the authenticated encryption algorithm Joltik, which was a second‐round finalist in the CAESAR competition.
Manman Li, Shaozhen Chen
doaj +1 more source
Epigenetic Regulation in the Pathogenesis of Renal Inflammation: Insights and Therapeutic Potentials
ABSTRACT Renal inflammation is a common pathological process in various kidney diseases, often initiated by factors such as toxins, ischemia, or autoimmune reactions. This inflammatory response can result in structural damage and a rapid decline in renal function.
Yu‐Hang Dong +5 more
wiley +1 more source
Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method
We present practical attacks on IAR-CTR and IAR-CFB, AE modes proposed by Hwang and Gope to offer both privacy and authenticity in a single pass. Then we use the idea of iCOFB, which is originally defined with a tweakable random function, to fix the IAR ...
Xueqi Zhu +4 more
doaj +1 more source
A personal 360° view of applications of ‘biomimetic’ molecular recognition
Abstract Molecular recognition between biological molecules has formed the basis for innumerable applications in biotechnology for the last seven decades or so. Techniques such as affinity chromatography, solid‐phase and aqueous two‐phase extraction, affinity precipitation, biomimetic catalytic systems, biosensors and molecular imprinting all exploit ...
Christopher R Lowe
wiley +1 more source
Advancing Extracellular Vesicle Research: A Review of Systems Biology and Multiomics Perspectives
ABSTRACT Extracellular vesicles (EVs) are membrane‐bound vesicles secreted by various cell types into the extracellular space and play a role in intercellular communication. Their molecular cargo varies depending on the cell of origin and its functional state.
Gloria Kemunto +2 more
wiley +1 more source
Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm
Kiasu-BC algorithm is an internal tweakable block cipher of authenticated encryption algorithm Kiasu as one of first-round candidates in the CAESAR competition.The precomputation complexity is reduced by utilizing the freedom of the tweak and the ...
Manman LI, Shaozhen CHEN
doaj +2 more sources

