Results 91 to 100 of about 231,688 (280)
Differential Power Analysis against the Miller Algorithm [PDF]
Article en cours de publicationPairings permit several protocol simplications and original scheme creation, for example Identity Based Cryptography protocols.
Bajard, Jean-Claude +4 more
core
Influence of Test Temperature and Test Frequency on Fatigue Life of Aluminum Alloy EN AW‐2618A
The influence of test temperature and test frequency on the fatigue life of EN AW‐2618A is investigated. High‐cycle fatigue tests are performed at different test temperatures and frequencies on the 1000 h/230°C overaged state. Both test parameters reduce fatigue life due to time‐dependent damage mechanisms.
Ying Han +5 more
wiley +1 more source
Soft Analytical Side-Channel Attacks [PDF]
In this paper, we introduce a new approach to side-channel key recovery, that combines the low time/memory complexity and noise tolerance of standard (divide and conquer) differential power analysis with the optimal data complexity of algebraic side-channel attacks.
Veyrat-Charvillon, Nicolas +3 more
openaire +3 more sources
Do not let thermal drift and instrument artifacts deceive high‐temperature nanoindentation results. We compare classical Oliver–Pharr and automatic image recognition analyses across steels and a Ni alloy to quantify these effects. Accounting for artifacts reveals systematic softening with temperature, while Cr and Ni additions boost resistance ...
Velislava Yonkova +2 more
wiley +1 more source
The widespread use of smartphones has brought convenience and connectivity to the fingertips of the masses. As a result, this has paved the way for potential security vulnerabilities concerning sensitive data, particularly by exploiting side-channel ...
Sidra Abbas +6 more
doaj +1 more source
Viktoriia Shtefan, Thorgund Nemec, Ute Hempel, Annett Gebert and coworkers demonstrate that anodic treatment of Ti–Cu‐based metallic glass in a nontoxic pyrophosphate electrolyte forms a protective bilayered Ti/Zr‐oxide film enriched with Cu nanocrystals.
Viktoriia Shtefan +8 more
wiley +1 more source
This work explores Li‐substituted P2 layered oxides for Na‐ion batteries by crystallographic and electrochemical studies. The effect of lithium on superstructure orderings, on phase transitions during synthesis and electrochemical cycling and on the interplay of O‐ versus TM‐redox is revealed via various advanced techniques, including semi‐simultaneous
Mingfeng Xu +5 more
wiley +1 more source
Zinc(II) coordination complexes with tunable aryloxy‐imine ligands exhibit controllable supramolecular self‐assembly into hierarchical fibrous structures. Coordination‐driven stacking, not π–π interactions, enables gelation, dynamic assembly/disassembly, and enhanced nanomechanical properties.
Merlin R. Stühler +10 more
wiley +1 more source
Side-Channel Attacks Meet Secure Network Protocols [PDF]
Side-channel attacks are powerful tools for breaking systems that implement cryptographic algorithms. The Advanced Encryption Standard (AES) is widely used to secure data, including the communication within various network protocols. Major cryptographic libraries such as OpenSSL or ARM mbed TLS include at least one implementation of the AES.
Biryukov, Alex +2 more
openaire +2 more sources
Shellac, a centuries‐old natural resin, is reimagined as a green material for flexible electronics. When combined with silver nanowires, shellac films deliver transparency, conductivity, and stability against humidity. These results position shellac as a sustainable alternative to synthetic polymers for transparent conductors in next‐generation ...
Rahaf Nafez Hussein +4 more
wiley +1 more source

