Results 101 to 110 of about 514,969 (347)
Zinc(II) coordination complexes with tunable aryloxy‐imine ligands exhibit controllable supramolecular self‐assembly into hierarchical fibrous structures. Coordination‐driven stacking, not π–π interactions, enables gelation, dynamic assembly/disassembly, and enhanced nanomechanical properties.
Merlin R. Stühler +10 more
wiley +1 more source
Software Grand Exposure: SGX Cache Attacks Are Practical
Side-channel information leakage is a known limitation of SGX. Researchers have demonstrated that secret-dependent information can be extracted from enclave execution through page-fault access patterns.
Brasser, Ferdinand +5 more
core
PAPP: Prefetcher-Aware Prime and Probe Side-channel Attack
CPU memory prefetchers can substantially interfere with prime and probe cache side-channel attacks, especially on in-order CPUs which use aggressive prefetching. This interference is not accounted for in previous attacks.
Daimeng Wang +3 more
semanticscholar +1 more source
This study highlights the importance of accounting for stoichiometric hydrogen produced when utilizing Si photocatalysts. The stoichiometric contribution is sacrificial reagent dependent and decreases with increasing sterics around the catalyst surface.
Sarrah H. Putwa +4 more
wiley +1 more source
Side-Channel Attack on ARADI in Non-Profiling Scenarios
ARADI is a low-latency block cipher introduced by the NSA (National Security Agency), designed with consideration for applications in memory encryption.
Donggeun Kwon, Seokhie Hong
doaj +1 more source
This study demonstrates that the dual delivery of BMP‐2/‐7 coding cmRNAs for bone healing is demonstrated as feasible, safe, and highly osteogenic. Compared to single BMP‐2 or BMP‐7 cmRNAs, the combination enhances the production of both mineral and organic components of the extracellular matrix when delivered using a collagen‐HA scaffold, supporting ...
Claudia Del Toro Runzer +7 more
wiley +1 more source
Soft Analytical Side-Channel Attacks [PDF]
In this paper, we introduce a new approach to side-channel key recovery, that combines the low time/memory complexity and noise tolerance of standard (divide and conquer) differential power analysis with the optimal data complexity of algebraic side-channel attacks.
Veyrat-Charvillon, Nicolas +3 more
openaire +3 more sources
Modulating Electrochemical CO2 Reduction Pathways via Interfacial Electric Field
Engineering interfacial electric fields in Cu/ITO electrodes enables precise control of CO2 reduction pathways. Charge transfer from Cu to ITO generates positively charged Cu species that steer selectivity from ethylene toward methane. This work demonstrates how interfacial electric‐field modulation can direct reaction intermediates and transform ...
Mahdi Salehi +7 more
wiley +1 more source
Shellac, a centuries‐old natural resin, is reimagined as a green material for flexible electronics. When combined with silver nanowires, shellac films deliver transparency, conductivity, and stability against humidity. These results position shellac as a sustainable alternative to synthetic polymers for transparent conductors in next‐generation ...
Rahaf Nafez Hussein +4 more
wiley +1 more source
Template attack of Crypto chip based on clustering
The known-key establishment template and others full control of experimental equipment preconditions are required to implement the traditional template attack.The preconditions restrict the application scenario of template attack.The template attack is ...
Zhen WU +3 more
doaj +2 more sources

