搜索结果: 1-15 共查到“stream”相关记录490条 . 查询时间(0.109 秒)
Design and control of a novel side-stream extractive distillation column for separating methanol-toluene binary azeotrope with intermediate boiling entrainer
Side-stream extractive distillation column intermediate boiling entrainer Dynamic control Binary azeotrope Methanol-toluene
font style='font-size:12px;'>
2023/6/19
It is innovative and important to perform complex binary azeotrope separation via single distillation column. In the article, design and control of a novel and simple side-stream extractive distillati...
Design and comparison of conventional and side-stream extractive distillation sequences for separating the methanol-toluene binary azeotrope with intermediate boiling entrainer
Side-stream extractive distillation Separation sequences Intermediate boiling entrainer Eco-efficiency analysis Methanol-toluene
font style='font-size:12px;'>
2023/6/19
The side-stream extractive distillation (SSED) system is attracting widespread attention due to its high eco-efficiency. In the article, three double-column SSED (DC-SSED) sequences and two single-col...
Stream pollution from mountaintop mining doesn’t stay put in the water(图)
Stream pollution mountaintop mining put in the water
font style='font-size:12px;'>
2020/4/10
Since the 1980s, a sprawling mountaintop removal mining complex in southern West Virginia has been leaching pollutants -- such as selenium -- into nearby streams at levels deemed unsafe for aquatic li...
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet
Small-state stream cipher Grain Correlation attack
font style='font-size:12px;'>
2019/7/15
Many cryptographers have focused on lightweight cryptography, and a huge number of lightweight block ciphers have been proposed. On the other hand, designing lightweight stream ciphers is a challengin...
Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80
Fast correlation attack Stream cipher Grain-like
font style='font-size:12px;'>
2019/7/8
The fast correlation attack (FCA) is one of the most important cryptanalytic techniques against LFSR-based stream ciphers. In CRYPTO 2018, Todo et al. found a new property for the FCA and proposed a n...
On designing secure small-state stream ciphers against time-memory-data tradeoff attacks
Stream cipher Ultra-lightweight Small-state
font style='font-size:12px;'>
2019/6/10
A new generation of stream ciphers, small-state stream ciphers (SSCs), was born in 2015 with the introduction of the Sprout cipher. The new generation is based on using key bits not only in the initia...
Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields
symmetric cryptography stream cipher correlation attack
font style='font-size:12px;'>
2019/3/20
We propose a general method for security evaluation of SNOW 2.0-like ciphers against correlation attacks that are built similarly to known attacks on SNOW 2.0. Unlike previously known methods, the met...
Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher
stream cipher RC4 VMPC-R
font style='font-size:12px;'>
2019/1/18
We propose an authenticated encryption scheme for the VMPC-R stream cipher. VMPC-R is an RC4-like algorithm proposed in 2013. It was created in a challenge to find a bias-free cipher within the RC4 de...
Tight Security Bounds for Generic Stream Cipher Constructions
Stream Ciphers Generic Time-Memory-Data Tradeoff Attacks Security Lower Bound Proofs
font style='font-size:12px;'>
2019/1/9
The design of modern stream ciphers is strongly influenced by the fact that Time-Memory-Data tradeoff attacks (TMD-TO attacks) reduce their effective key length to SL/2SL/2, where SLSL denotes the inn...
A new SNOW stream cipher called SNOW-V
SNOW Stream Cipher 5G Mobile System Security
font style='font-size:12px;'>
2018/11/30
In this paper we are proposing a new member in the SNOW family of stream ciphers, called SNOW-V. The motivation is to meet an industry demand of very high speed encryption in a virtualized environment...
Fast Near Collision Attack on the Grain v1 Stream Cipher
Cryptanalysis Stream ciphers Grain
font style='font-size:12px;'>
2018/2/9
Modern stream ciphers often adopt a large internal state to resist various attacks, where the cryptanalysts have to deal with a large number of variables when mounting state recovery attacks. In this ...
Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode)
cryptanalysis time-memory tradeoff attacks block ciphers
font style='font-size:12px;'>
2018/2/3
In this paper, we consider the implications of parallelizing time-memory tradeoff attacks using a large number of distributed processors. It is shown that Hellman’s original tradeoff method and the Bi...
Radioactivity From Oil And Gas Wastewater Persists In Pennsylvania Stream Sediments(图)
Radioactivity Oil And Gas Wastewater Pennsylvania Stream Sediments
font style='font-size:12px;'>
2018/2/1
More than seven years after Pennsylvania officials requested that the disposal of radium-laden fracking wastewater into surface waters be restricted, a new Duke University study finds that high levels...
Data Is a Stream: Security of Stream-Based Channels
secure channel data stream AEAD
font style='font-size:12px;'>
2017/12/13
The common approach to defining secure channels in the literature is to consider transportation of discrete messages provided via atomic encryption and decryption interfaces. This, however, ignores th...
A Note on Stream Ciphers that Continuously Use the IV
Stream Ciphers Lightweight Cryptography Time-Memory-Data Tradeoff Attacks
font style='font-size:12px;'>
2017/12/6
Time-memory-data tradeoff (TMD-TO) attacks limit the security level of many classical stream ciphers (like E0E0, A5/1, Trivium, Grain) to n/2n/2, where nn denotes the inner state length of the underly...