Results 51 to 60 of about 11,604 (291)
This study develops a novel atomic engineering strategy to fine‐tune the spin state of α‐Fe2O3 catalysts toward a medium‐spin state, thereby modulating peroxymonosulfate activation and selectively yielding surface‐bound radicals. Compared with free radicals, surface‐bound radicals exhibit moderated oxidation potential, extended lifespan, surface ...
Shuyu Wang +7 more
wiley +1 more source
Clean Up Behind You ‐ Novel Patterning Approach for Solid Immersion Lenses
A focused ion beam (FIB) milling strategy enables rapid fabrication of solid immersion lenses (SILs) with smooth, debris‐free surfaces eliminating the need for post‐processing. The optimized pattern improves efficiency and surface quality. SILs containing NV centers are also investigated, confirming the technique's suitability for quantum and photonic ...
Aleksei Tsarapkin +10 more
wiley +1 more source
Internal collision attack on Maraca
We present an internal collision attack against the new hash function Maraca which has been submitted to the SHA-3 competition. This attack requires 2^{237} calls to the round function and its complexity is lower than the complexity of the generic collision attack when the length of the message digest is greater than or equal to 512.
Canteaut, Anne, Naya-Plasencia, Maria
openaire +3 more sources
Radiation‐Resistant Aluminum Alloy for Space Missions in the Extreme Environment of the Solar System
A novel ultrafine‐grained aluminum crossover alloy exhibits unprecedented radiation resistance and mechanical stability under extreme irradiation doses up to 100 dpa. The exceptional resilience arises from thermodynamically stable T‐phase precipitates, enabling lightweight structural materials for next‐generation spacecraft and extraterrestrial ...
Patrick D. Willenshofer +9 more
wiley +1 more source
Collision attack on reduced-round Camellia [PDF]
Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct some efficient distinguishers between 4-round Camellia and a random permutation of the blocks space. By using collision-searching techniques, the distinguishers are used to attack on 6, 7, 8 and 9 rounds of Camellia with 128-bit key and 8, 9 and 10 rounds of ...
openaire +1 more source
Practical Collision Attacks against Round-Reduced SHA-3 [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Guo, Jian +5 more
openaire +3 more sources
Adaptive Twisting Metamaterials
This work introduces torque‐controlled twisting metamaterials as a transformative platform for adaptive crashworthiness. By combining multiscale predictive modeling with experimental validation on additively manufactured gyroids, it demonstrates tunable stiffness, collapse stress, and energy absorption.
Mattia Utzeri +6 more
wiley +1 more source
Chosen-Prefix Collisions on AES-like Hashing
Chosen-prefix collision (CPC) attack was first presented by Stevens, Lenstra and de Weger on MD5 at Eurocrypt 2007. A CPC attack finds a collision for any two chosen prefixes, which is a stronger variant of collision attack. CPCs are naturally harder to
Shiyao Chen +3 more
doaj +1 more source
A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure
We analyze the security of RSA prime generation implemented on embedded devices by a practical power analysis attack. Unlike previous differential power analysis-based attack on primality tests of RSA prime generation exploiting the deterministic ...
Sangyub Lee +3 more
doaj +1 more source
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee +3 more
doaj +1 more source

