Results 41 to 50 of about 8,710 (316)
The effect of GSM-like ELF radiation on the alpha band of the human resting EEG [PDF]
Mobile phone handsets such as those operating in the GSM network emit extremely low frequency electromagnetic fields ranging from DC to at least 40 kHz. As a subpart of an extended protocol, the influence of these fields on the human resting EEG has been
Cosic, I+4 more
core +1 more source
Higher-Order Time Sharing Masking
At CHES 2024, Time Sharing Masking (TSM) was introduced as a novel low-latency masking technique for hardware circuits. TSM offers area and randomness efficiency, as well as glitch-extended PINI security, but it is limited to first-order security.
Dilip Kumar S. V.+4 more
doaj +1 more source
Two-permutation-based hashing with binary mixing
We consider the generic design of compression functions based on two n-bit permutations and XOR-based mixing functions. It is known that any such function mapping n+α${n+\alpha }$ to α bits, with 1≤α≤n${1\le \alpha \le n}$, can achieve at most min{2α/2 ...
Luykx Atul+3 more
doaj +1 more source
Analysis and Comparison of Table-based Arithmetic to Boolean Masking
Masking is a popular technique to protect cryptographic implementations against side-channel attacks and comes in several variants including Boolean and arithmetic masking.
Michiel Van Beirendonck+2 more
doaj +1 more source
Herein we show the synthesis and characterization of organo‐f‐element‐functionalized polyanionic compounds, including the triangular P33− and the P144− polyphosphide Zintl anion. The title compounds, which are the largest organo‐f‐element polyphosphides known to date, were obtained by reduction of white phosphorus with precursors of the early ...
David Frick+3 more
wiley +2 more sources
Classification of Balanced Quadratic Functions
S-boxes, typically the only nonlinear part of a block cipher, are the heart of symmetric cryptographic primitives. They significantly impact the cryptographic strength and the implementation characteristics of an algorithm.
Lauren De Meyer, Begül Bilgin
doaj +1 more source
A pangenome analysis of the plant pathogen Pseudomonas syringae reveals two novel natural product families that facilitate niche adaptation. Comprehensive genomic and chemical analyses uncover unique biosynthetic gene clusters linked to host specificity and environmental fitness.
Shuaibing Zhang+7 more
wiley +2 more sources
Investigation of the mechanisms of electromagnetic field interaction with proteins [PDF]
In our earlier work we have proposed that protein activation is electromagnetic in its nature. This prediction is based on the resonant recognition model (RRM) where proteins are analyzed using digital signal processing (DSP) methods applied to the ...
Cosic, I, Pirogova, E, Vojisavljevic, V
core +1 more source
The CCA-secure lattice-based post-quantum key encapsulation scheme Saber is a candidate in the NIST’s post-quantum cryptography standardization process.
Angshuman Karmakar+3 more
doaj +1 more source
A series of pyridine‐fused hetero‐ and homodimers containing azacorrole moiety is obtained. The spectral, redox, and magnetic properties of the bis(azacorrole)s reflect an electron‐donating character of these systems and interaction between the subunits which depends on the substitution pattern.
Sha Li+6 more
wiley +1 more source