Results 121 to 130 of about 1,678,458 (327)
This study explores overlapping charge transport mechanisms in TADF materials and identifies spin‐orbit coupling as the dominant mechanism for triplet‐to‐singlet transition in carbazole‐based cyanoarene emitters. Computational investigations reveal a second spin‐orbit‐coupling‐mediated reverse intersystem crossing pathway, significantly enhancing the ...
Annika Morgenstern +13 more
wiley +1 more source
Collision‐Resilient Winged Drones Enabled by Tensegrity Structures
Based on structures of birds such as the woodpeck, this article presents the collision‐resilient aerial robot, SWIFT. SWIFT leverages tensegrity structures in the fuselage and wings which allow it to undergo large deformations in a crash, without sustaining damage. Experiments show that SWIFT can reduce impact forces by 70% over conventional structures.
Omar Aloui +5 more
wiley +1 more source
Improved integral attack——random linear distinguish and key recovery attack
Based on the integral attack and collision attack of four rounds of AES, a random linear distinguish attack against four rounds of SP block ciphers was proposed, which took advantage of the non-uniformity of linear biases’ distribution between some ...
Shaoyu DU
doaj +2 more sources
This review identifies key design considerations for insect‐inspired microrobots capable of multimodal locomotion. To draw inspiration, biological and robotic strategies for moving in air, on water surfaces, and underwater are examined, along with approaches for crossing the air–water interface.
Mija Jovchevska +2 more
wiley +1 more source
On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting [PDF]
Amir Moradi +5 more
openalex +1 more source
Mechanical Cues Regulate Cargo Sorting and Export at the Golgi
A pathway is identified linking extracellular matrix stiffness to secretion via Src–FAK–AMPK–GBF1 signaling. Golgi‐localized GBF1 acts as a mechanotransducer whose phosphorylation controls post‐Golgi cargo sorting toward secretion or lysosomal degradation.
Greta Serafino +21 more
wiley +1 more source
Comprehensive Analysis and Implementation of Isogeny-Based Hash Functions
This paper analyzes the security and performance of the isogeny-based hash functions. The isogeny-based hash function was first proposed by Charles, Goren, and Lauter, and is referred to as the CGL hash function.
Donghoe Heo +4 more
doaj +1 more source
A Formula That Generates Hash Collisions
We present an explicit formula that produces hash collisions for the Merkle-Damg{\aa}rd construction. The formula works for arbitrary choice of message block and irrespective of the standardized constants used in hash functions, although some padding ...
Brockmann, Andrew
core
Extracellular vesicle (EV)‐packaged CDC37 are released from TMBhiCTLlo breast cancer cells with high CDC37 expression, and internalized into endo/phagosomes of dendritic cells (DCs). Within these compartments, CDC37 locked HSP90–antigen complex, preventing antigen release into the cytosol.
Ruxin Wang +10 more
wiley +1 more source
Statistical Tools Flavor Side-Channel Collision Attacks [PDF]
Amir Moradi
openalex +1 more source

