Results 51 to 60 of about 133,184 (295)

Quantum Lightning Never Strikes the Same State Twice [PDF]

open access: yes, 2017
Public key quantum money can be seen as a version of the quantum no-cloning theorem that holds even when the quantum states can be verified by the adversary.
B Barak   +17 more
core   +2 more sources

Systemic T Cell Receptor Profiling Reveals Adaptive Immune Activation and Potential Immune Signatures of Diagnosis and Brain Atrophy in Epilepsy

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Epilepsy is increasingly associated with immune dysregulation and inflammation. The T cell receptor (TCR), a key mediator of adaptive immunity, shows repertoire alterations in various immune‐mediated diseases. The unique TCR sequence serves as a molecular barcode for T cells, and clonal expansion accompanied by reduced overall TCR ...
Yong‐Won Shin   +12 more
wiley   +1 more source

A Spatially Resolved View on the Aging Substantia nigra: An Exploratory Proteomic Study

open access: yesAdvanced Biology, EarlyView.
Although aging is the most important risk factor for several neurodegenerative diseases, the molecular effects of physiological aging are still understudied. By applying spatially‐resolved proteomic analyses of the human substantia nigra pars compacta, alterations in vesicular trafficking and mitochondrial proteins are observed, as well as reduced ...
Britta Eggers   +10 more
wiley   +1 more source

Chosen-Prefix Collisions on AES-like Hashing

open access: yesIACR Transactions on Symmetric Cryptology
Chosen-prefix collision (CPC) attack was first presented by Stevens, Lenstra and de Weger on MD5 at Eurocrypt 2007. A CPC attack finds a collision for any two chosen prefixes, which is a stronger variant of collision attack. CPCs are naturally harder to
Shiyao Chen   +3 more
doaj   +1 more source

Near Collision Side Channel Attacks [PDF]

open access: yes, 2016
Side channel collision attacks are a powerful method to exploit side channel leakage. Otherwise than a few exceptions, collision attacks usually combine leakage from distinct points in time, making them inherently bivariate. This work introduces the notion of near collisions to exploit the fact that values depending on the same sub-key can have similar
Lejla Batina   +2 more
openaire   +2 more sources

Additive Manufacturing of Gradient Stiffness Honeycombs Using Thermoplastic Polyurethane Composite Material Variations

open access: yesAdvanced Engineering Materials, EarlyView.
By combining porous, solid, and carbon fiber‐reinforced thermoplastic polyurethane within a single 3D printed honeycomb structure, this current work achieved precise control over spatial stiffness while ensuring strong interlayer adhesion. The findings demonstrate enhanced energy absorption and densification strain, outperforming traditional uniform ...
Savvas Koltsakidis   +2 more
wiley   +1 more source

A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure

open access: yesIEEE Access, 2019
We analyze the security of RSA prime generation implemented on embedded devices by a practical power analysis attack. Unlike previous differential power analysis-based attack on primality tests of RSA prime generation exploiting the deterministic ...
Sangyub Lee   +3 more
doaj   +1 more source

A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure

open access: yesIEEE Access, 2020
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee   +3 more
doaj   +1 more source

Removing Homocoupling Defects in Alkoxy/Alkyl‐PBTTT Enhances Polymer:Fullerene Co‐Crystal Formation and Stability

open access: yesAdvanced Functional Materials, EarlyView.
PBTTT‐OR‐R, a C14‐alkoxy/alkyl‐PBTTT polymer derivative, is of substantial interest for optoelectronics due to its specific fullerene intercalation behavior and enhanced charge‐transfer absorption. Comparing this polymer with (S) and without (O) homocoupling defects reveals that PBTTT‐OR‐R(O) forms stable co‐crystals with PC61BM, while PBTTT‐OR‐R(S ...
Zhen Liu   +14 more
wiley   +1 more source

Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding

open access: yesTongxin xuebao, 2014
The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented.
Gao-li WANG, Yan-zhao SHEN
doaj   +2 more sources

Home - About - Disclaimer - Privacy