搜索结果: 1-15 共查到“stream”相关记录505条 . 查询时间(0.093 秒)
Design and control of a novel side-stream extractive distillation column for separating methanol-toluene binary azeotrope with intermediate boiling entrainer
Side-stream extractive distillation column intermediate boiling entrainer Dynamic control Binary azeotrope Methanol-toluene
2023/6/19
It is innovative and important to perform complex binary azeotrope separation via single distillation column. In the article, design and control of a novel and simple side-stream extractive distillati...
Design and comparison of conventional and side-stream extractive distillation sequences for separating the methanol-toluene binary azeotrope with intermediate boiling entrainer
Side-stream extractive distillation Separation sequences Intermediate boiling entrainer Eco-efficiency analysis Methanol-toluene
2023/6/19
The side-stream extractive distillation (SSED) system is attracting widespread attention due to its high eco-efficiency. In the article, three double-column SSED (DC-SSED) sequences and two single-col...
Stream pollution from mountaintop mining doesn’t stay put in the water(图)
Stream pollution mountaintop mining put in the water
2020/4/10
Since the 1980s, a sprawling mountaintop removal mining complex in southern West Virginia has been leaching pollutants -- such as selenium -- into nearby streams at levels deemed unsafe for aquatic li...
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet
Small-state stream cipher Grain Correlation attack
2019/7/15
Many cryptographers have focused on lightweight cryptography, and a huge number of lightweight block ciphers have been proposed. On the other hand, designing lightweight stream ciphers is a challengin...
Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80
Fast correlation attack Stream cipher Grain-like
2019/7/8
The fast correlation attack (FCA) is one of the most important cryptanalytic techniques against LFSR-based stream ciphers. In CRYPTO 2018, Todo et al. found a new property for the FCA and proposed a n...
On designing secure small-state stream ciphers against time-memory-data tradeoff attacks
Stream cipher Ultra-lightweight Small-state
2019/6/10
A new generation of stream ciphers, small-state stream ciphers (SSCs), was born in 2015 with the introduction of the Sprout cipher. The new generation is based on using key bits not only in the initia...
Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields
symmetric cryptography stream cipher correlation attack
2019/3/20
We propose a general method for security evaluation of SNOW 2.0-like ciphers against correlation attacks that are built similarly to known attacks on SNOW 2.0. Unlike previously known methods, the met...
Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher
stream cipher RC4 VMPC-R
2019/1/18
We propose an authenticated encryption scheme for the VMPC-R stream cipher. VMPC-R is an RC4-like algorithm proposed in 2013. It was created in a challenge to find a bias-free cipher within the RC4 de...
Tight Security Bounds for Generic Stream Cipher Constructions
Stream Ciphers Generic Time-Memory-Data Tradeoff Attacks Security Lower Bound Proofs
2019/1/9
The design of modern stream ciphers is strongly influenced by the fact that Time-Memory-Data tradeoff attacks (TMD-TO attacks) reduce their effective key length to SL/2SL/2, where SLSL denotes the inn...
In this paper we are proposing a new member in the SNOW family of stream ciphers, called SNOW-V. The motivation is to meet an industry demand of very high speed encryption in a virtualized environment...
Fast Near Collision Attack on the Grain v1 Stream Cipher
Cryptanalysis Stream ciphers Grain
2018/2/9
Modern stream ciphers often adopt a large internal state to resist various attacks, where the cryptanalysts have to deal with a large number of variables when mounting state recovery attacks. In this ...
Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode)
cryptanalysis time-memory tradeoff attacks block ciphers
2018/2/3
In this paper, we consider the implications of parallelizing time-memory tradeoff attacks using a large number of distributed processors. It is shown that Hellman’s original tradeoff method and the Bi...
Radioactivity From Oil And Gas Wastewater Persists In Pennsylvania Stream Sediments(图)
Radioactivity Oil And Gas Wastewater Pennsylvania Stream Sediments
2018/2/1
More than seven years after Pennsylvania officials requested that the disposal of radium-laden fracking wastewater into surface waters be restricted, a new Duke University study finds that high levels...
The common approach to defining secure channels in the literature is to consider transportation of discrete messages provided via atomic encryption and decryption interfaces. This, however, ignores th...
A Note on Stream Ciphers that Continuously Use the IV
Stream Ciphers Lightweight Cryptography Time-Memory-Data Tradeoff Attacks
2017/12/6
Time-memory-data tradeoff (TMD-TO) attacks limit the security level of many classical stream ciphers (like E0E0, A5/1, Trivium, Grain) to n/2n/2, where nn denotes the inner state length of the underly...