Results 31 to 40 of about 1,200 (188)

A Thermodynamic 3D Model for the Simulation of Diffusion‐Controlled Alloying Processes in Heterogeneous Material Structures

open access: yesAdvanced Engineering Materials, EarlyView.
A numerical model resulting from irreversible thermodynamics for describing transport processes is introduced, focusing on thermodynamic activity gradients as the actual driving force for diffusion. Implemented in CUDA C++ and using CalPhaD methods for determining the necessary activity data, the model accurately simulates interdiffusion in aluminum ...
Ulrich Holländer   +3 more
wiley   +1 more source

Improving Fast Algebraic Attacks [PDF]

open access: yes, 2004
An algebraic attack is a method for cryptanalysis which is based on finding and solving a system of nonlinear equations. Recently, algebraic attacks where found helpful in cryptanalysing LFSR-based stream ciphers. The efficiency of these attacks greatly depends on the degree of the nonlinear equations.
openaire   +2 more sources

Backbone Heterojunction Photocatalysts for Efficient Sacrificial Hydrogen Production

open access: yesAdvanced Functional Materials, EarlyView.
Herein, a ‘single‐component’ organic semiconductor photocatalyst is presented in which a molecular donor is bonded to a polymer acceptor. The resultant material demonstrates exceptional photocatalytic activity for hydrogen evolution in aqueous triethylamine with an outstanding external quantum efficiency of 38% at 420 nm.
Richard J. Lyons   +11 more
wiley   +1 more source

Class of constructions of even variables Boolean function with optimum algebraic immunity

open access: yesTongxin xuebao, 2009
A second order recursive construction of even variables Boolean function with optimum algebraic immunity was proposed.It could be observed that the constructed Boolean functions have well cryptographic properties,such as good balance,high algebraic ...
CHEN Yin-dong, LU Pei-zhong
doaj   +2 more sources

Cryptanalysis of Selected ARX-Based Block Ciphers

open access: yesVietnam Journal of Computer Science
The security of digital communication and information systems is mostly dependent on block ciphers. ARX-based ciphers are widely used due to their simplicity and efficiency.
Praveen Kumar Gundaram
doaj   +1 more source

Ultrafast Photocatalytic Wettability Switching in Substrate‐Interface Tailored Titanium Dioxide Thin Films

open access: yesAdvanced Materials Interfaces, EarlyView.
This study demonstrates ultrafast photocatalytic wettability switching in TiO2 thin films by tailoring substrate doping and interface oxides. Enhanced switching rates and hemiwicking effects are achieved through optimized material stacks and nanostructuring.
Rucha A. Deshpande   +6 more
wiley   +1 more source

Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In LWE-based KEMs, observed decryption errors leak information about the secret key in the form of equations or inequalities. Several practical fault attacks have already exploited such leakage by either directly applying a fault or enabling a chosen ...
Julius Hermelink   +4 more
doaj   +1 more source

Physical Origin of Temperature Induced Activation Energy Switching in Electrically Conductive Cement

open access: yesAdvanced Science, EarlyView.
The temperature‐induced Arrhenius activation energy switching phenomenon of electrical conduction in electrically conductive cement originates from structural degradation within the biphasic ionic‐electronic conduction architecture and shows percolation‐governed characteristics: pore network opening dominates the low‐percolation regime with downward ...
Jiacheng Zhang   +7 more
wiley   +1 more source

Synchronization of Analog Neuron Circuits With Digital Memristive Synapses: An Hybrid Approach

open access: yesAdvanced Electronic Materials, EarlyView.
An hybrid circuit mimicking neural units coupled using memristive synapses is introduced. The analog neurons provide flexibility and robustness, and the digital memristive coupling guarantees the full reconfigurability of the interconnection. The onset of a synchronized spiking behavior in two circuits mimicking the Izhikevich neuron is discussed from ...
Lamberto Carnazza   +3 more
wiley   +1 more source

Practical Algebraic Side-Channel Attacks Against ACORN [PDF]

open access: yes, 2019
The authenticated cipher ACORN is one of the two finalists of the CAESAR competition and is intended for lightweight applications. Because such use cases require protection against physical attacks, several works have been undertaken to achieve secure implementations. Although dedicated threshold and masked schemes have been proposed, no practical side-
Adomnicai, Alexandre   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy