Results 121 to 130 of about 35,425 (325)
Some traditional cryptographic techniques, like the Secure Hash Algorithm (SHA-256 for hashing), Rivest-Shamir-Adleman (RSA/Elliptic Curve for signing) and Advanced Encryption Standard (AES for encryption), perform well on systems with good hardware ...
Pulkit Singh +3 more
doaj +1 more source
Bio‐Inspired Molecular Events in Poly(Ionic Liquids)
Originating from dipolar and polar inter‐ and intra‐chain interactions of the building blocks, the topologies and morphologies of poly(ionic liquids) (PIL) govern their nano‐ and micro‐processibility. Modulating the interactions of cation‐anion pairs with aliphatic dipolar components enables the tunability of properties, facilitated by “bottom‐up ...
Jiahui Liu, Marek W. Urban
wiley +1 more source
This study introduces a novel chloro boron subphthalocyanine/polymer blend OFET sensor achieving 0.005 ppb limit of detection for ammonia at room temperature and high selectivity against similar amines. An original theoretical framework is proposed to describe the sensing mechanism, relating analyte molecular volume and Lewis basicity to sensor ...
Kavinraaj Ella Elangovan +6 more
wiley +1 more source
Gourd‐Inspired Design of Unit Cell with Multiple Gradients for Physiological‐Range Pressure Sensing
Gourd‐shaped micro‐dome arrays with coordinated modulus, conductivity, and geometric gradients co‐optimize sensitivity and linearity in piezoresistive tactile sensors. Under pressure, a solid upper dome embeds into a porous lower dome, triggering rapid contact‐area growth and series‐to‐parallel conduction, enabling unsaturated, intensity‐resolved ...
Jiayi Xu +6 more
wiley +1 more source
Light reflectance increases along incidence angle and transmittance significantly drops around 90‐degree incidence angle. Here, we report two‐photon laser printed micro mirrors that redirect the skimming light beam into normal light absorption. Using this technique, light‐driven micro walkers and grippers are demonstrated by using grazing incidence ...
Leilei Song, Jianfeng Yang, Hao Zeng
wiley +1 more source
Systematic literature review: Trend analysis on the design of lightweight block cipher
A. Zakaria +4 more
semanticscholar +1 more source
Memory Encryption for Smart Cards Barı¸s Ege 1, Elif Bilge Kavun 2,andTolgaYalçın 2 [PDF]
. With the latest advances in attack methods, it has become increasingly more difficult to secure data stored on smart cards, especially on non-volatile memories (NVMs), which may store sensitive information such as cryptographic keys or program code ...
core
Novel Functional Materials via 3D Printing by Vat Photopolymerization
This Perspective systematically analyzes strategies for incorporating functionalities into 3D‐printed materials via Vat Photopolymerization (VP). It explores the spectrum of achievable functionalities in recently reported novel materials—such as conductive, energy‐storing, biodegradable, stimuli‐responsive, self‐healing, shape‐memory, biomaterials, and
Sergey S. Nechausov +3 more
wiley +1 more source
ABSTRACT Breathable membranes that reject chemical warfare agents (CWAs) are required for next‐generation protective apparel. A dual‐function graphene oxide (GO)‐polyamine architecture is introduced that addresses the long‐standing tradeoff between vapor transmission and CWA selectivity.
Hyungjun Kim +6 more
wiley +1 more source
3-subset meet-in-the-middle attack on block cipher TWIS
To do further analysis of the security of lightweight block cipher TWIS, 3-subset meet-in-the-middle attack was applied to 10-round TWIS without the final whitening.
Ya-fei ZHENG, Hong-ru WEI
doaj +2 more sources

