Results 71 to 80 of about 346,808 (259)
On the Machine Learning Techniques for Side-channel Analysis [PDF]
Side-channel attacks represent one of the most powerful category of attacks on cryptographic devices with profiled attacks in a prominent place as the most powerful among them.
Guilley, Sylvain +2 more
core
Duplex Stainless Steel Laser‐Surface Textured: Stability in Brine Solution
Controlled laser‐surface treatment (LST) of duplex DSS2205 steel is performed to increase its stability in brine solution under cyclic electrochemical assays. The superior protection with respect to flat and smooth panels is attributed to the presence of FeCr2O4 as the main protective oxide layer in the LST surface, after corrosion tests. The stability
Mohammad Rezayat +5 more
wiley +1 more source
It is shown that laser ablation pretreatment under oxygen‐free conditions enables copper–aluminium bonding at significantly lower deformation degrees and improved properties compared to mechanical brushing. Laser ablation further increases interface contact area and induces favourable residual stress states and microstructural compatibility ...
Khemais Barienti +11 more
wiley +1 more source
Power analysis attack on masked AES implementation [PDF]
Šifrovací algoritmy jsou dnes běžně používaným zabezpečovacím prvkem. V některých situacích je algoritmus provozován na speciálním modulu, aby nedocházelo k útokům pomocí internetu.
Jakubíková, Radka
core
Carbon nanomaterial‐reinforced epoxy composites exhibit pronounced piezoresistive behavior, enabling intrinsic damage sensing under cyclic and fatigue loading. This review critically compares carbon nanotube and graphene systems, correlating filler content, percolation threshold, and gauge factor with sensing stability and damage evolution.
J. M. Parente +3 more
wiley +1 more source
Near Collision Side Channel Attacks [PDF]
Side channel collision attacks are a powerful method to exploit side channel leakage. Otherwise than a few exceptions, collision attacks usually combine leakage from distinct points in time, making them inherently bivariate. This work introduces the notion of near collisions to exploit the fact that values depending on the same sub-key can have similar
Barış Ege +2 more
openaire +1 more source
Electrical Conductivities of Conductors, Semiconductors, and Their Mixtures at Elevated Temperatures
This article presents a comprehensive review of temperature‐dependent electrical conductivity data for multiple material classes at elevated temperatures, highlighting a persistent conductivity gap between metals and semiconductors in the range of 102$\left(10\right)^{2}$– 107$\left(10\right)^{7}$ S/m. Metal–ceramic irregular metamaterials are proposed
Valentina Torres Nieto, Marcia A. Cooper
wiley +1 more source
Measurement-device-independent QKD with Modified Coherent State
The measurement-device-independent quantum key distribution (MDI-QKD) protocol has been proposed for the purpose of removing the detector side channel attacks.
Chen, Wei +6 more
core +1 more source
Fungal mycelia grown into biodegradable scaffolds and infused with titania nanoparticles show enhanced ultraviolet shielding, thermal protection, and surface nonwettability. Properties were tuned by drying methods, revealing structure–function relationships.
Juwon S. Afolayan +2 more
wiley +1 more source
This work explores Li‐substituted P2 layered oxides for Na‐ion batteries by crystallographic and electrochemical studies. The effect of lithium on superstructure orderings, on phase transitions during synthesis and electrochemical cycling and on the interplay of O‐ versus TM‐redox is revealed via various advanced techniques, including semi‐simultaneous
Mingfeng Xu +5 more
wiley +1 more source

