Results 91 to 100 of about 346,808 (259)
Smart Home Privacy Protection Methods against a Passive Wireless Snooping Side-Channel Attack. [PDF]
Nassiri Abrishamchi MA +4 more
europepmc +1 more source
Bio‐based and (semi‐)synthetic zwitterion‐modified novel materials and fully synthetic next‐generation alternatives show the importance of material design for different biomedical applications. The zwitterionic character affects the physiochemical behavior of the material and deepens the understanding of chemical interaction mechanisms within the ...
Theresa M. Lutz +3 more
wiley +1 more source
Tight and Scalable Side-Channel Attack Evaluations through Asymptotically Optimal Massey-like Inequalities on Guessing Entropy. [PDF]
Tănăsescu A +3 more
europepmc +1 more source
Side-Channel Attacks Meet Secure Network Protocols [PDF]
Side-channel attacks are powerful tools for breaking systems that implement cryptographic algorithms. The Advanced Encryption Standard (AES) is widely used to secure data, including the communication within various network protocols. Major cryptographic libraries such as OpenSSL or ARM mbed TLS include at least one implementation of the AES.
Biryukov, Alex +2 more
openaire +2 more sources
MOFs and COFs in Electronics: Bridging the Gap between Intrinsic Properties and Measured Performance
Metal‐organic frameworks (MOFs) and covalent organic frameworks (COFs) hold promise for advanced electronics. However, discrepancies in reported electrical conductivities highlight the importance of measurement methodologies. This review explores intrinsic charge transport mechanisms and extrinsic factors influencing performance, and critically ...
Jonas F. Pöhls, R. Thomas Weitz
wiley +1 more source
Practical Algebraic Side-Channel Attacks Against ACORN [PDF]
The authenticated cipher ACORN is one of the two finalists of the CAESAR competition and is intended for lightweight applications. Because such use cases require protection against physical attacks, several works have been undertaken to achieve secure implementations. Although dedicated threshold and masked schemes have been proposed, no practical side-
Adomnicai, Alexandre +2 more
openaire +3 more sources
Measurement of heat transfer and pressure drop in rectangular channels with turbulence promoters [PDF]
Periodic rib turbulators were used in advanced turbine cooling designs to enhance the internal heat transfer. The objective of the present project was to investigate the combined effects of the rib angle of attack and the channel aspect ratio on the ...
Han, J. C., Ibrahim, M. Y., Park, J. S.
core +1 more source
A spleen‐targeting hybrid nanoplatform (RBCMV‐LNP‐RP) harnessing erythrophagocytosis mimics senescent red blood cell clearance to achieve spleen‐specific delivery of rapamycin. This biomimetic system enables selective accumulation in splenic macrophages, orchestrating systemic immune reprogramming and promoting mucosal healing in an inflammatory bowel ...
Jun Kwon +10 more
wiley +1 more source
A minimally invasive, transepithelial corneal cross‐linking (TE‐CXL) approach is presented using upconversion nanoparticles (UCNPs)‐loaded contact lenses (UCLs), after topical delivery of hyaluronate–riboflavin conjugates. The NIR‐to‐UV/blue light conversion by UCNPs in a UCL can activate riboflavin for TE‐CXL, resulting in the biomechanical strength ...
Gibum Lee +8 more
wiley +1 more source
Side-channel attacks on convolutional neural networks based on the hybrid attention mechanism
In the field of security assessment of password chips, side-channel attacks are an important and effective means of extracting sensitive information by analysing the physical characteristics of the chip during operation, providing an important basis for ...
Tao Feng +3 more
doaj +1 more source

