Results 81 to 90 of about 346,808 (259)
Software Grand Exposure: SGX Cache Attacks Are Practical
Side-channel information leakage is a known limitation of SGX. Researchers have demonstrated that secret-dependent information can be extracted from enclave execution through page-fault access patterns.
Brasser, Ferdinand +5 more
core
Zinc(II) coordination complexes with tunable aryloxy‐imine ligands exhibit controllable supramolecular self‐assembly into hierarchical fibrous structures. Coordination‐driven stacking, not π–π interactions, enables gelation, dynamic assembly/disassembly, and enhanced nanomechanical properties.
Merlin R. Stühler +10 more
wiley +1 more source
Side-Channel Attack on ARADI in Non-Profiling Scenarios
ARADI is a low-latency block cipher introduced by the NSA (National Security Agency), designed with consideration for applications in memory encryption.
Donggeun Kwon, Seokhie Hong
doaj +1 more source
Modulating Electrochemical CO2 Reduction Pathways via Interfacial Electric Field
Engineering interfacial electric fields in Cu/ITO electrodes enables precise control of CO2 reduction pathways. Charge transfer from Cu to ITO generates positively charged Cu species that steer selectivity from ethylene toward methane. This work demonstrates how interfacial electric‐field modulation can direct reaction intermediates and transform ...
Mahdi Salehi +7 more
wiley +1 more source
Soft Analytical Side-Channel Attacks [PDF]
In this paper, we introduce a new approach to side-channel key recovery, that combines the low time/memory complexity and noise tolerance of standard (divide and conquer) differential power analysis with the optimal data complexity of algebraic side-channel attacks.
Veyrat-Charvillon, Nicolas +3 more
openaire +3 more sources
Security Through Amnesia: A Software-Based Solution to the Cold Boot Attack on Disk Encryption [PDF]
Disk encryption has become an important security measure for a multitude of clients, including governments, corporations, activists, security-conscious professionals, and privacy-conscious individuals.
Simmons, Patrick
core +1 more source
Shellac, a centuries‐old natural resin, is reimagined as a green material for flexible electronics. When combined with silver nanowires, shellac films deliver transparency, conductivity, and stability against humidity. These results position shellac as a sustainable alternative to synthetic polymers for transparent conductors in next‐generation ...
Rahaf Nafez Hussein +4 more
wiley +1 more source
Backbone Heterojunction Photocatalysts for Efficient Sacrificial Hydrogen Production
Herein, a ‘single‐component’ organic semiconductor photocatalyst is presented in which a molecular donor is bonded to a polymer acceptor. The resultant material demonstrates exceptional photocatalytic activity for hydrogen evolution in aqueous triethylamine with an outstanding external quantum efficiency of 38% at 420 nm.
Richard J. Lyons +11 more
wiley +1 more source
Template attack of Crypto chip based on clustering
The known-key establishment template and others full control of experimental equipment preconditions are required to implement the traditional template attack.The preconditions restrict the application scenario of template attack.The template attack is ...
Zhen WU +3 more
doaj +2 more sources
Implementation of Drug‐Induced Rhabdomyolysis and Acute Kidney Injury in Microphysiological System
A modular Muscle–Kidney proximal tubule‐on‐a‐chip integrates 3D skeletal muscle and renal proximal tubule tissues to model drug‐induced rhabdomyolysis and acute kidney injury. The coculture system enables dynamic tissue interaction, functional contraction monitoring, and quantification of nephrotoxicity, revealing drug side effect‐induced metabolic ...
Jaesang Kim +4 more
wiley +1 more source

