Results 101 to 110 of about 399,159 (347)
This work explores Li‐substituted P2 layered oxides for Na‐ion batteries by crystallographic and electrochemical studies. The effect of lithium on superstructure orderings, on phase transitions during synthesis and electrochemical cycling and on the interplay of O‐ versus TM‐redox is revealed via various advanced techniques, including semi‐simultaneous
Mingfeng Xu +5 more
wiley +1 more source
A Survey of of Side-Channel Attacks and Mitigation for Processor Interconnects
With advancements in chip technology, the number of cores in modern commercial processors continues to rise, leading to increased complexity in interconnects and on-chip networks.
Jie Yuan +4 more
doaj +1 more source
Several group signature or identity schemes have been proposed for addressing the issues of security in a vehicular ad hoc network (VANET). Nonetheless, none of these schemes suitably cope with the performance efficient during the signing and verifying ...
Jalawi Sulaiman Alshudukhi +2 more
doaj +1 more source
Coating the standard polypropylene separator with a porous red phosphorous nanosheet greatly improves cycling performance in Li electrode cells. The phosphorus‐based surface chemistry deactivates electrolyte solvent decomposition and enhances the cleavage of F‐containing salt, resulting in an inorganic‐dominated electrolyte interphase (SEI) composition
Jiangpeng Wang +9 more
wiley +1 more source
Algebraic side‐channel attacks on Trivium stream cipher
Algebraic Side‐Channel Attacks (ASCAs), first proposed by Renauld and Standaert in 2009, are a potent cryptanalysis method against block ciphers. In this paper, the authors initially utilize ASCAs to analyze the security of the Trivium stream cipher ...
Wenlong Sun, Jie Guan
doaj +1 more source
Atomic Size Misfit for Electrocatalytic Small Molecule Activation
This review explores the application and mechanisms of atomic size misfit in catalysis for small molecule activation, focusing on how structural defects and electronic properties can effectively lower the energy barriers of chemical bonds in molecules like H2O, CO2, and N2.
Ping Hong +3 more
wiley +1 more source
Deep Learning to Evaluate Secure RSA Implementations
This paper presents the results of several successful profiled side-channel attacks against a secure implementation of the RSA algorithm. The implementation was running on a ARM Core SC 100 completed with a certified EAL4+ arithmetic co-processor.
Mathieu Carbone +7 more
doaj +1 more source
Near Collision Side Channel Attacks [PDF]
Side channel collision attacks are a powerful method to exploit side channel leakage. Otherwise than a few exceptions, collision attacks usually combine leakage from distinct points in time, making them inherently bivariate. This work introduces the notion of near collisions to exploit the fact that values depending on the same sub-key can have similar
Barış Ege +2 more
openaire +1 more source
Cu‐based catalysts as a cornerstone in advancing sustainable energy technologies are fully reviewed in this manuscript, highlighting their potential in photo‐ and electrocatalysis. It includes metallic copper, copper oxides, copper sulfides, copper halide perovskites, copper‐based metal–organic frameworks (MOFs), and covalent organic frameworks (COFs),
Jéssica C. de Almeida +16 more
wiley +1 more source
A secure cryptographic algorithm against side channel attacks [PDF]
Historically, a computing resource is scarce and expensive. In the last few decades, considerable efforts have been made to design efficient codes in terms of the storage space and running time.
Abd Ghafar, Amir Hamzah, Abu, Nur Azman
core

