We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 9,673 results
  1. Near Collision Attack Against Grain V1

    A near collision attack against the Grain v1 stream cipher was proposed by Zhang et al. in Eurocrypt 18. The attack uses the fact that two internal...
    Subhadeep Banik, Daniel Collins, Willi Meier in Applied Cryptography and Network Security
    Conference paper 2023
  2. Restricted near collision attack on Plantlet

    Plantlet is a recent lightweight stream cipher designed by Mikhalev, Armknecht and Müller in IACR ToSC 2017. This design paradigm receives attention...

    Satyam Kumar, Sandip Kumar Mondal, ... Avishek Adhikari in Journal of Cryptographic Engineering
    Article 09 October 2023
  3. Ipsilateral and contralateral warnings: effects on decision-making and eye movements in near-collision scenarios

    Cars are increasingly capable of providing drivers with warnings and advice. However, whether drivers should be provided with ipsilateral warnings...

    Joost de Winter, Jimmy Hu, Bastiaan Petermeijer in Journal on Multimodal User Interfaces
    Article Open access 25 May 2022
  4. Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance

    We construct more efficient cryptosystems with provable security against adaptive attacks, based on simple and natural hardness assumptions in the...
    Tibor Jager, Rafael Kurek, David Niehues in Public-Key Cryptography – PKC 2021
    Conference paper 2021
  5. Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160

    In this paper, we present an improved cryptanalysis of the double-branch hash function RIPEMD-160 standardized by ISO/IEC. First, how to...

    Gaoli Wang, Fukang Liu, ... Christoph Dobraunig in Designs, Codes and Cryptography
    Article 28 January 2020
  6. Mobile robot path planning and obstacle avoidance using hybrid algorithm

    Path planning of a mobile robot is a budding field of research and a significant problem to solve in robot navigation. It is widely used for...

    T. Mohanraj, T. Dinesh, ... B. Sheshadhri in International Journal of Information Technology
    Article 15 September 2023
  7. Time for Traffic Manoeuvres

    The use of driving assistance systems up to the level of autonomous cars asks for methods showing that cars equipped with such systems behave safely....
    Christopher Bischopink, Ernst-Rüdiger Olderog in Applicable Formal Methods for Safe Industrial Products
    Chapter 2023
  8. Impact Position Detection of Baseball Bat Using Multi-axis Accelerometers

    In baseball, whether a batter has the ability to hit accurately is one of the key factors affecting his or her batting performance. Therefore, we...
    Yi-Chin Lu, Chiang Liu, Hsi-Pin Ma in Artificial Intelligence in HCI
    Conference paper 2024
  9. Revisit Two Memoryless State-Recovery Cryptanalysis Methods on A5/1

    At ASIACRYPT 2019, Zhang proposes a near collision attack on A5/1. He claims that such an attack method can recover the 64-bit A5/1 state with a time...
    Mingxing Wang, Yonglin Hao in Information Security and Cryptology
    Conference paper 2021
  10. Pervasive Computing for Efficient Intra-UAV Connectivity: Based on Context-Awareness

    Swarms of unmanned aerial vehicles are increasingly being utilized for a variety of operations. However, extremely variable environmental...
    Biruk E. Tegicho, Tadilo E. Bogale, Corey Graves in Ubiquitous Networking
    Conference paper 2023
  11. Learning practically feasible policies for online 3D bin packing

    We tackle the online 3D bin packing problem (3D-BPP), a challenging yet practically useful variant of the classical bin packing problem. In this...

    Hang Zhao, Chenyang Zhu, ... Kai Xu in Science China Information Sciences
    Article 27 December 2021
  12. Succinct Arguments for RAM Programs via Projection Codes

    Motivated by the goal of proving statements that involve small subsets of a big database, we introduce and study the notion of projection codes. A...
    Yuval Ishai, Rafail Ostrovsky, Akash Shah in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  13. Multi-objective offline and online path planning for UAVs under dynamic urban environment

    This paper presents a multi-objective hybrid path planning method MOHPP for unmanned aerial vehicles (UAVs) in urban dynamic environments. Several...

    Nassim Sadallah, Saïd Yahiaoui, ... Nadia Nouali-Taboudjemat in International Journal of Intelligent Robotics and Applications
    Article 15 September 2021
  14. A scenario generation pipeline for autonomous vehicle simulators

    To develop a realistic simulator for autonomous vehicle testing, the simulation of various scenarios that may occur near vehicles in the real world...

    Mingyun Wen, Jisun Park, Kyungeun Cho in Human-centric Computing and Information Sciences
    Article Open access 03 June 2020
  15. Hitting Enemies with Projectiles

    Once you have a player you can control and a way to fire projectiles, the next step involves hitting enemies with a projectile. This involves...
    Wallace Wang, Tonnetta Walcott in Programming for Game Design
    Chapter 2024
  16. Fast Near Collision Attack on the Grain v1 Stream Cipher

    Modern stream ciphers often adopt a large internal state to resist various attacks, where the cryptanalysts have to deal with a large number of...
    Bin Zhang, Chao Xu, Willi Meier in Advances in Cryptology – EUROCRYPT 2018
    Conference paper 2018
  17. Game 1: Meteor Shower

    Let's start by creating a new project called dinometeor02 by the process shown in Chapter 1.
    Andrés Cruz Yoris in Flame Game Development
    Chapter 2024
  18. Basic Hazards

    Now that our player can be killed, let’s start coding up some villainy to kill them. We’ll make a generic script called Hazard that makes a...
    Chapter 2024
  19. Reliable and Accurate Implicit Neural Representation of Multiple Swept Volumes with Application to Safe Human–Robot Interaction

    In automated production using collaborative robots in a manufacturing cell, a crucial aspect is to avoid collisions to ensure the safety of workers...

    Ming-Hsiu Lee, **g-Sin Liu in SN Computer Science
    Article Open access 12 March 2024
  20. Enhancing Prediction Entropy Estimation of RNG for On-the-Fly Test

    Random number generators (RNGs) play a vital role in cryptographic applications, and ensuring the quality of the generated random numbers is crucial....
    Yuan Ma, Weisong Gu, ... Shijie Jia in Information Security and Cryptology – ICISC 2023
    Conference paper 2024
Did you find what you were looking for? Share feedback.