Results 41 to 50 of about 147,541 (282)
ABSTRACT Objective Accurate localization of epileptogenic tubers (ETs) in patients with tuberous sclerosis complex (TSC) is essential but challenging, as these tubers lack distinct pathological or genetic markers to differentiate them from other cortical tubers.
Tinghong Liu +11 more
wiley +1 more source
Quantum differential cryptanalysis to the block ciphers
Differential cryptanalysis is one of the most popular methods in attacking block ciphers. However, there still some limitations in traditional differential cryptanalysis.
Li, Hong-Wei, Yang, Li
core +1 more source
Rheumatologic Manifestations of Patients With Type B Insulin Resistance
Objective The objectives of this study were to identify laboratory and clinical features associated with type B insulin resistance (TBIR), a rare condition caused by autoantibodies that inhibit the insulin receptor, most frequently occurring in the setting of systemic lupus erythematosus (SLE), and to increase awareness of this rare, life‐threatening ...
S. Amara Ogbonnaya +4 more
wiley +1 more source
It is shown that laser ablation pretreatment under oxygen‐free conditions enables copper–aluminium bonding at significantly lower deformation degrees and improved properties compared to mechanical brushing. Laser ablation further increases interface contact area and induces favourable residual stress states and microstructural compatibility ...
Khemais Barienti +11 more
wiley +1 more source
An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults
Embedded encryption devices and smart sensors are vulnerable to physical attacks. Due to the continuous shrinking of chip size, laser injection, particle radiation and electromagnetic transient injection are possible methods that introduce transient ...
Liang Dong +5 more
doaj +1 more source
DeepSQLi: Deep Semantic Learning for Testing SQL Injection
Security is unarguably the most serious concern for Web applications, to which SQL injection (SQLi) attack is one of the most devastating attacks. Automatically testing SQLi vulnerabilities is of ultimate importance, yet is unfortunately far from trivial
Anna Huang Cheng-Zhi +15 more
core +1 more source
Stabilization of L‐PBF Ni50.7Ti49.3 under low‐cycle loading was investigated. Recoverable strain after cycling was dependent on the amount of applied load. Recovery ratio was 53.4% and 35.1% at intermediate and high load, respectively. The maximum total strain reached 10.3% at a high load of 1200 MPa.
Ondřej Červinek +5 more
wiley +1 more source
Multidimensional Zero-Correlation Linear Cryptanalysis of the Block Cipher KASUMI [PDF]
The block cipher KASUMI is widely used for security in many synchronous wireless standards. It was proposed by ETSI SAGE for usage in 3GPP (3rd Generation Partnership Project) ciphering algorthms in 2001.
Chen, Shaozhen, Yi, Wentan
core
Thermomechanical fatigue tests of laser beam powder bed fusion (PBF‐LB) Inconel 718 show that the additively manufactured material reaches almost the lifetimes of conventionally‐rolled material under no‐dwell conditions. Introducing dwell times at the maximum temperature markedly reduces the lifetimes due to pronounced grain boundary sliding associated
Stefan Guth +6 more
wiley +1 more source
Subspace Trail Cryptanalysis and its Applications to AES
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a ...
Lorenzo Grassi +2 more
doaj +1 more source

