Results 61 to 70 of about 11,604 (291)
A near‐infrared photosensitizer that facilitates efficient solid‐state photon upconversion by recycling triplets formed within a fullerene‐based donor–acceptor bulk‐heterojunction system is demonstrated. Spectroscopic investigations reveal that the energy of photogenerated charge transfer states of triplet character (3CT) is subsequently transferred to
Maciej Klein +4 more
wiley +1 more source
Some observations of near collision attacks on grain v1
Near collision attacks and fast near collision attacks on stream ciphers are controversial attack methods in the field of cryptography in recent years, and their attack results are based on reduced experimental observations and derivation of birthday ...
Shaoyu Du, Weiping Gu, Bin Zhang
doaj +1 more source
From Copper Nanoparticles to Alumina Encapsulated Porous Layers With Enhanced Mechanical Stability
This study analyzes the synthesis‐structure relation of individual Cu nanoparticles and highly porous nanoparticle‐based Cu films using different sputtering‐based nanoparticle sources. The inherent mechanical instability of the films is tackled with Al2O3 encapsulation through atomic layer deposition, enabling 4‐fold increase in critical force in ...
Dominik Gutnik +6 more
wiley +1 more source
Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented.
Gao-li WANG, Yan-zhao SHEN
doaj +2 more sources
Improvement on a Masked White-Box Cryptographic Implementation
White-box cryptography is a software technique to protect secret keys of cryptographic algorithms from attackers who have access to memory. By adapting techniques of differential power analysis to computation traces consisting of runtime information ...
Seungkwang Lee, Myungchul Kim
doaj +1 more source
ZnO/CeO2 composite nanoparticles synthesized via a facile hydrothermal method simultaneously degrade ciprofloxacin, tetracycline, methylene blue, and methyl orange in a four‐component mixture under UV irradiation. The Ce3+/Ce4+ redox cycling and oxygen vacancies at the ZnO/CeO2 interface suppress charge recombination and enhance reactive species ...
Aditya Rianjanu +11 more
wiley +1 more source
In this paper, we describe attacks on the recently proposed Haraka hash functions. First, for the two hash functions Haraka-256/256 and Haraka-512/256 in the family, we show how two colliding messages can be constructed in about 216 function ...
Jérémy Jean
doaj +1 more source
Collision‐Resilient Winged Drones Enabled by Tensegrity Structures
Based on structures of birds such as the woodpeck, this article presents the collision‐resilient aerial robot, SWIFT. SWIFT leverages tensegrity structures in the fuselage and wings which allow it to undergo large deformations in a crash, without sustaining damage. Experiments show that SWIFT can reduce impact forces by 70% over conventional structures.
Omar Aloui +5 more
wiley +1 more source
TreeSpider: In‐Canopy Exploration With Tether‐Based Aerial Modular Arms
A tethered drone with perching arms and a 360° ring enables unprecedented maneuverability within dense forest canopies. By dynamically adjusting tether length and decoupling pitch from the frame, it navigates between branches, senses multiple trees, and interacts physically with foliage.
Luca Romanello +7 more
wiley +1 more source
Research and design of authenticated encryption algorithm based on AES round function
The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time, and has extensive research and application prospects in the field of information security. With the mixed integer linear programming
GAO Guoqiang, LI Zichen
doaj +3 more sources

