Results 21 to 30 of about 461 (143)

On the immunity of rotation symmetric Boolean functions against fast algebraic attacks

open access: yesDiscrete Applied Mathematics, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zhang, Yin, Liu, Meicheng, Lin, Dongdai
openaire   +2 more sources

Fast Algebraic Attacks on Stream Ciphers with Linear Feedback [PDF]

open access: yes, 2003
A classical construction of stream ciphers is to combine several LFSRs and a highly non-linear Boolean function f. Their security is usually analysed in terms of correlation attacks, that can be seen as solving a system of multivariate linear equations, true with some probability.
openaire   +1 more source

Backbone Heterojunction Photocatalysts for Efficient Sacrificial Hydrogen Production

open access: yesAdvanced Functional Materials, EarlyView.
Herein, a ‘single‐component’ organic semiconductor photocatalyst is presented in which a molecular donor is bonded to a polymer acceptor. The resultant material demonstrates exceptional photocatalytic activity for hydrogen evolution in aqueous triethylamine with an outstanding external quantum efficiency of 38% at 420 nm.
Richard J. Lyons   +11 more
wiley   +1 more source

Ultrafast Photocatalytic Wettability Switching in Substrate‐Interface Tailored Titanium Dioxide Thin Films

open access: yesAdvanced Materials Interfaces, EarlyView.
This study demonstrates ultrafast photocatalytic wettability switching in TiO2 thin films by tailoring substrate doping and interface oxides. Enhanced switching rates and hemiwicking effects are achieved through optimized material stacks and nanostructuring.
Rucha A. Deshpande   +6 more
wiley   +1 more source

Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations

open access: yesIACR Transactions on Symmetric Cryptology
Hash functions are a crucial component in incrementally verifiable computation (IVC) protocols and applications. Among those, recursive SNARKs and folding schemes require hash functions to be both fast in native CPU computations and compact in algebraic
Lorenzo Grassi   +5 more
doaj   +1 more source

Capacitive versus Faradaic Microelectrodes for Extracellular Stimulation: A Fully Coupled FEM–Hodgkin–Huxley Study of Thresholds and Current Redistribution

open access: yesAdvanced Electronic Materials, EarlyView.
A fully coupled FEM–HH model shows that ideally capacitive microelectrodes can achieve lower charge‐density thresholds than Faradaic contacts under current‐controlled stimulation. The advantage stems from the dynamics of surface current density on capacitive interfaces, which redirects current beneath adherent neurons.
Aleksandar Opančar   +2 more
wiley   +1 more source

Interpretability and Representability of Commutative Algebra, Algebraic Topology, and Topological Spectral Theory for Real‐World Data

open access: yesAdvanced Intelligent Discovery, EarlyView.
This article investigates how persistent homology, persistent Laplacians, and persistent commutative algebra reveal complementary geometric, topological, and algebraic invariants or signatures of real‐world data. By analyzing shapes, synthetic complexes, fullerenes, and biomolecules, the article shows how these mathematical frameworks enhance ...
Yiming Ren, Guo‐Wei Wei
wiley   +1 more source

Thin and Compact Versus Thick and Porous Fouling Layers in the Emulsion Polymerization of Acrylates and Vinyl Acetates Studied In Situ With a Quartz Crystal Microbalance (QCM)

open access: yesJournal of Applied Polymer Science, EarlyView.
ABSTRACT Building on a quartz crystal microbalance with dissipation monitoring (QCM‐D), fouling in emulsion polymerization was compared between acrylate dispersions stabilized with a mobile, anionic surfactant and dispersions of poly(vinyl acetate‐co‐vinyl neodecanoate), PVAc, stabilized with polyvinyl alcohol, PVOH.
K. M. Hoffmann   +5 more
wiley   +1 more source

Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks [PDF]

open access: yes, 2006
In this paper we evaluate the resistance of stream ciphers with linear feedback against fast algebraic attacks. We summarize the current knowledge about fast algebraic attacks, develop new and more efficient algorithms to evaluate the resistance against fast algebraic attacks, study theoretical bounds on the attacks, and apply our methodology to the ...
Braeken, An, Lano, Joseph, Preneel, Bart
openaire   +2 more sources

Optimal model‐based design of experiments for parameter precision: Supercritical extraction case

open access: yesThe Canadian Journal of Chemical Engineering, EarlyView.
Abstract This study investigates the process of chamomile oil extraction from flowers. A parameter‐distributed model consisting of a set of partial differential equations is used to describe the governing mass transfer phenomena in a cylindrical packed bed with solid chamomile particles under supercritical conditions using carbon dioxide as a solvent ...
Oliwer Sliczniuk, Pekka Oinas
wiley   +1 more source

Home - About - Disclaimer - Privacy