2 resultados para TAV
em Queensland University of Technology - ePrints Archive
Resumo:
Sodium niobates doped with different amount of tantalum (TaV) were prepared via thermal reaction process. It was found pure nanofibril and bar-like solids can be obtained when tantalum was introduced into the reaction system. For the well-crystallized fibril solids, the Na+ ions are difficult to be exchanged, and the radioactive ions such as Sr2+ and Ra2+ ions just deposit on the surface of the fibers during the sorption process, resulting in lower sorption capacity and distribution coefficients (Kd)`. However, the bar-like solids are poorly-crystallized and have lots of exchangeable Na+ ions. They are able to remove highly hazardous bivalent radioactive isotopes such as Sr2+ and Ra2+ ions. Even in the presence of lots of Na+ ions, they also have higher Kd. More importantly, such sorption finally intelligently triggers considerable collapse of the structure, resulting in the entrapment of the toxic bivalent cations permanently in the solids so that they can be safely disposed. This study highlights new opportunities for the preparation of Nb-based adsorbents to efficiently remove the toxic radioactive ions from contaminated water.
Resumo:
Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which produce the same hash value under this hash function. We then show a second preimage attack on Tav-128 which succeeds with a complexity of 262 calls to the compression function. Finally, we study the constituent functions of Tav-128 and show that the concatenation of nonlinear functions A and B produces a 64-bit permutation from 32-bit messages. This could be a useful light weight primitive for future RFID protocols.