Results 31 to 40 of about 1,200 (188)
A numerical model resulting from irreversible thermodynamics for describing transport processes is introduced, focusing on thermodynamic activity gradients as the actual driving force for diffusion. Implemented in CUDA C++ and using CalPhaD methods for determining the necessary activity data, the model accurately simulates interdiffusion in aluminum ...
Ulrich Holländer +3 more
wiley +1 more source
Improving Fast Algebraic Attacks [PDF]
An algebraic attack is a method for cryptanalysis which is based on finding and solving a system of nonlinear equations. Recently, algebraic attacks where found helpful in cryptanalysing LFSR-based stream ciphers. The efficiency of these attacks greatly depends on the degree of the nonlinear equations.
openaire +2 more sources
Backbone Heterojunction Photocatalysts for Efficient Sacrificial Hydrogen Production
Herein, a ‘single‐component’ organic semiconductor photocatalyst is presented in which a molecular donor is bonded to a polymer acceptor. The resultant material demonstrates exceptional photocatalytic activity for hydrogen evolution in aqueous triethylamine with an outstanding external quantum efficiency of 38% at 420 nm.
Richard J. Lyons +11 more
wiley +1 more source
Class of constructions of even variables Boolean function with optimum algebraic immunity
A second order recursive construction of even variables Boolean function with optimum algebraic immunity was proposed.It could be observed that the constructed Boolean functions have well cryptographic properties,such as good balance,high algebraic ...
CHEN Yin-dong, LU Pei-zhong
doaj +2 more sources
Cryptanalysis of Selected ARX-Based Block Ciphers
The security of digital communication and information systems is mostly dependent on block ciphers. ARX-based ciphers are widely used due to their simplicity and efficiency.
Praveen Kumar Gundaram
doaj +1 more source
This study demonstrates ultrafast photocatalytic wettability switching in TiO2 thin films by tailoring substrate doping and interface oxides. Enhanced switching rates and hemiwicking effects are achieved through optimized material stacks and nanostructuring.
Rucha A. Deshpande +6 more
wiley +1 more source
In LWE-based KEMs, observed decryption errors leak information about the secret key in the form of equations or inequalities. Several practical fault attacks have already exploited such leakage by either directly applying a fault or enabling a chosen ...
Julius Hermelink +4 more
doaj +1 more source
Physical Origin of Temperature Induced Activation Energy Switching in Electrically Conductive Cement
The temperature‐induced Arrhenius activation energy switching phenomenon of electrical conduction in electrically conductive cement originates from structural degradation within the biphasic ionic‐electronic conduction architecture and shows percolation‐governed characteristics: pore network opening dominates the low‐percolation regime with downward ...
Jiacheng Zhang +7 more
wiley +1 more source
Synchronization of Analog Neuron Circuits With Digital Memristive Synapses: An Hybrid Approach
An hybrid circuit mimicking neural units coupled using memristive synapses is introduced. The analog neurons provide flexibility and robustness, and the digital memristive coupling guarantees the full reconfigurability of the interconnection. The onset of a synchronized spiking behavior in two circuits mimicking the Izhikevich neuron is discussed from ...
Lamberto Carnazza +3 more
wiley +1 more source
Practical Algebraic Side-Channel Attacks Against ACORN [PDF]
The authenticated cipher ACORN is one of the two finalists of the CAESAR competition and is intended for lightweight applications. Because such use cases require protection against physical attacks, several works have been undertaken to achieve secure implementations. Although dedicated threshold and masked schemes have been proposed, no practical side-
Adomnicai, Alexandre +2 more
openaire +3 more sources

