Results 21 to 30 of about 2,921 (221)
Intellectual and literary engagement of Dobrica Ćosić in homeland [PDF]
Dobrica chose for his life, literary refuge and activity in culture his homeland Ribrska Banja, Vrnjačka Banja, Kruševac and Velika Drenova. For the majority of his important literary oeuvres Dobrica Ćosić had literary workshops in Ribarska and Vrnjačka ...
Lazarević Velibor S.
doaj
Rotational-XOR Cryptanalysis of Reduced-round SPECK
In this paper we formulate a SAT/SMT model for Rotational-XOR (RX) cryptanalysis in ARX primitives for the first time. The model is successfully applied to the block cipher family Speck, and distinguishers covering more rounds than previously are found ...
Yunwen Liu +3 more
doaj +1 more source
Higher-Order Time Sharing Masking
At CHES 2024, Time Sharing Masking (TSM) was introduced as a novel low-latency masking technique for hardware circuits. TSM offers area and randomness efficiency, as well as glitch-extended PINI security, but it is limited to first-order security.
Dilip Kumar S. V. +4 more
doaj +1 more source
A total of 16 chemically synthesized capsular polysaccharide (CPS) fragments related to Pseudomonas aeruginosa, Staphylococcus aureus, and Acinetobacter baumannii were analyzed by glycan microarray. Comparative screening revealed three conserved epitopes that act as cross‐protective vaccine lead candidates against multidrug‐resistant (MDR) bacterial ...
Amar Kumar Mishra +9 more
wiley +2 more sources
OPTIMSM: FPGA hardware accelerator for Zero-Knowledge MSM
The Multi-Scalar Multiplication (MSM) is the main barrier to accelerating Zero-Knowledge applications. In recent years, hardware acceleration of this algorithm on both FPGA and GPU has become a popular research topic and the subject of a multi-million ...
Xander Pottier +5 more
doaj +1 more source
Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars
The security of immobiliser and Remote Keyless Entry systems has been extensively studied over many years. Passive Keyless Entry and Start systems, which are currently deployed in luxury vehicles, have not received much attention besides relay attacks ...
Lennert Wouters +4 more
doaj +1 more source
Secure, Accurate, and Practical Narrow-Band Ranging System
Relay attacks pose a serious security threat to wireless systems, such as, contactless payment systems, keyless entry systems, or smart access control systems. Distance bounding protocols, which allow an entity to not only authenticate another entity but
Aysajan Abidin +5 more
doaj +1 more source
Role of Histidine‐Containing Peptoids in Accelerating the Kinetics of Calcite Growth
Amphiphilic histidine‐containing peptoids mimic carbonic anhydrase (CA) to accelerate calcite step growth. In the presence of Zn2+, they promote the deprotonation of HCO3−, the desolvation of Ca2+, and the reorganization of interfacial hydration layers, thereby reducing the activation barrier for calcite growth.
Mingyi Zhang +5 more
wiley +1 more source
Bioorthogonal chemistry was applied to intracellularly photoactivate Doxorubicin (Dox) using gold nanostars (AuNSt) and near‐infrared (NIR) light. Two prodrugs were used: one photoactivatable, masked with 2‐nitrobenzyl carbamate (proDox1) and another photolabile, masked with 2‐nitrobenzyl diol (proDox2), which was attached to the AuNSt surface.
Juan José Esteve‐Moreno +15 more
wiley +1 more source
A framework for cryptographic problems from linear algebra
We introduce a general framework encompassing the main hard problems emerging in lattice-based cryptography, which naturally includes the recently proposed Mersenne prime cryptosystem, but also problems coming from code-based cryptography.
Bootland Carl +3 more
doaj +1 more source

