Results 141 to 150 of about 514,969 (347)

pH‐Tunable Material Properties of Glycine‐Rich Condensates from Tick Bioadhesive

open access: yesAdvanced Functional Materials, EarlyView.
This work studies the influence of pH on the phase separation behavior of a disordered glycine‐rich protein found in tick bioadhesive. The results show profound impact on the propensity of coacervation, condensate microstructure and viscosity, amphiphilicity of the peptides, and effective encapsulation of therapeutic molecules.
Manali Nandy   +5 more
wiley   +1 more source

Improved Higher-Order Side-Channel Attacks with FPGA Experiments [PDF]

open access: bronze, 2005
Eric Peeters   +3 more
openalex   +1 more source

SCARE: Side Channel Attack on In-Memory Computing for Reverse\n Engineering [PDF]

open access: green, 2020
Sina Sayyah Ensan   +3 more
openalex   +1 more source

Nanomaterial‐Integrated Fiber Neural Probes for Deep Brain Monitoring and Modulation: Challenges and Opportunities

open access: yesAdvanced Functional Materials, EarlyView.
The article presents nanomaterial‐integrated fiber neural probes as innovative tools for deep brain molecular sensing, neural stimulation, and temperature monitoring. It examines breakthroughs in SERS‐based biomolecule detection, thermoplasmonic activation, and luminescent thermometry, alongside strategies to overcome stability, specificity, and ...
Di Zheng   +5 more
wiley   +1 more source

One Truth Prevails: A Deep-learning Based Single-Trace Power Analysis on RSA–CRT with Windowed Exponentiation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
In this paper, a deep-learning based power/EM analysis attack on the state-of-the-art RSA–CRT software implementation is proposed. Our method is applied to a side-channel-aware implementation with the Gnu Multi-Precision (MP) Library, which is a typical
Kotaro Saito   +3 more
doaj  

Deciphering the Interplay Between Wetting and Chemo‐Mechanical Fracture in Lithium‐Ion Battery Cathode Materials

open access: yesAdvanced Functional Materials, EarlyView.
The fundamental intricate couplings between electrolyte wetting and fracture evolution are investigated in large single‐crystal V2O5 samples using both experimental techniques and simulations. Both approaches reveal consistent fracture patterns and lithium distribution concentration maps influenced by the wetting mechanism.
Wan‐Xin Chen   +6 more
wiley   +1 more source

Shared FPGAs and the Holy Grail: Protections against Side-Channel and Fault Attacks

open access: green, 2021
Ognjen Glamočanin   +3 more
openalex   +2 more sources

Design of Efficient and Mechanically Robust Anion Exchange Membrane for Water Electrolysis Achieved by Chemically Crosslinked Elastomers using Polyfluorene‐Based Conjugated Polymers

open access: yesAdvanced Functional Materials, EarlyView.
High‐performance SEBS‐PFB AEM is developed by crosslinking SEBS‐amine with polyfluorene‐based crosslinker containing benzene spacer. With the superior electrochemical and mechanical properties, SEBS‐PFB enabled an AEMWE single cell to achieve a high current density of 14.0 A cm−2 at 2.0 V and 80 °C in 1 m KOH, using a PtRu/C cathode and Ni2Fe anode ...
Hyun Soo Kwon   +8 more
wiley   +1 more source

Upconversion Nanoparticles Embedded Photonic Contact Lens for Transepithelial Corneal Crosslinking Using Hyaluronate – Riboflavin Conjugate

open access: yesAdvanced Functional Materials, EarlyView.
A minimally invasive, transepithelial corneal cross‐linking (TE‐CXL) approach is presented using upconversion nanoparticles (UCNPs)‐loaded contact lenses (UCLs), after topical delivery of hyaluronate–riboflavin conjugates. The NIR‐to‐UV/blue light conversion by UCNPs in a UCL can activate riboflavin for TE‐CXL, resulting in the biomechanical strength ...
Gibum Lee   +8 more
wiley   +1 more source

Algebraic Side-Channel Attacks

open access: yes, 2009
In 2002, algebraic attacks using overdefined systems of equa- tions have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However, although a number of convinc- ing experiments have been performed against certain reduced algorithms, it is not clear whether these attacks can be successfully applied in gen- eral
Renauld, Mathieu   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy