Results 101 to 110 of about 399,159 (347)

Understanding and Optimizing Li Substitution in P2‐Type Sodium Layered Oxides for Sodium‐Ion Batteries

open access: yesAdvanced Functional Materials, EarlyView.
This work explores Li‐substituted P2 layered oxides for Na‐ion batteries by crystallographic and electrochemical studies. The effect of lithium on superstructure orderings, on phase transitions during synthesis and electrochemical cycling and on the interplay of O‐ versus TM‐redox is revealed via various advanced techniques, including semi‐simultaneous 
Mingfeng Xu   +5 more
wiley   +1 more source

A Survey of of Side-Channel Attacks and Mitigation for Processor Interconnects

open access: yesApplied Sciences
With advancements in chip technology, the number of cores in modern commercial processors continues to rise, leading to increased complexity in interconnects and on-chip networks.
Jie Yuan   +4 more
doaj   +1 more source

An Efficient Conditional Privacy-Preserving Authentication Scheme for the Prevention of Side-Channel Attacks in Vehicular Ad Hoc Networks

open access: yesIEEE Access, 2020
Several group signature or identity schemes have been proposed for addressing the issues of security in a vehicular ad hoc network (VANET). Nonetheless, none of these schemes suitably cope with the performance efficient during the signing and verifying ...
Jalawi Sulaiman Alshudukhi   +2 more
doaj   +1 more source

Unlocking Ultra‐Long Cycle Stability of Li Metal Electrode by Separators Modified by Porous Red Phosphorus Nanosheets

open access: yesAdvanced Functional Materials, EarlyView.
Coating the standard polypropylene separator with a porous red phosphorous nanosheet greatly improves cycling performance in Li electrode cells. The phosphorus‐based surface chemistry deactivates electrolyte solvent decomposition and enhances the cleavage of F‐containing salt, resulting in an inorganic‐dominated electrolyte interphase (SEI) composition
Jiangpeng Wang   +9 more
wiley   +1 more source

Algebraic side‐channel attacks on Trivium stream cipher

open access: yesIET Communications
Algebraic Side‐Channel Attacks (ASCAs), first proposed by Renauld and Standaert in 2009, are a potent cryptanalysis method against block ciphers. In this paper, the authors initially utilize ASCAs to analyze the security of the Trivium stream cipher ...
Wenlong Sun, Jie Guan
doaj   +1 more source

Atomic Size Misfit for Electrocatalytic Small Molecule Activation

open access: yesAdvanced Functional Materials, EarlyView.
This review explores the application and mechanisms of atomic size misfit in catalysis for small molecule activation, focusing on how structural defects and electronic properties can effectively lower the energy barriers of chemical bonds in molecules like H2O, CO2, and N2.
Ping Hong   +3 more
wiley   +1 more source

Deep Learning to Evaluate Secure RSA Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
This paper presents the results of several successful profiled side-channel attacks against a secure implementation of the RSA algorithm. The implementation was running on a ARM Core SC 100 completed with a certified EAL4+ arithmetic co-processor.
Mathieu Carbone   +7 more
doaj   +1 more source

Near Collision Side Channel Attacks [PDF]

open access: yes, 2016
Side channel collision attacks are a powerful method to exploit side channel leakage. Otherwise than a few exceptions, collision attacks usually combine leakage from distinct points in time, making them inherently bivariate. This work introduces the notion of near collisions to exploit the fact that values depending on the same sub-key can have similar
Barış Ege   +2 more
openaire   +1 more source

Copper‐based Materials for Photo and Electrocatalytic Process: Advancing Renewable Energy and Environmental Applications

open access: yesAdvanced Functional Materials, EarlyView.
Cu‐based catalysts as a cornerstone in advancing sustainable energy technologies are fully reviewed in this manuscript, highlighting their potential in photo‐ and electrocatalysis. It includes metallic copper, copper oxides, copper sulfides, copper halide perovskites, copper‐based metal–organic frameworks (MOFs), and covalent organic frameworks (COFs),
Jéssica C. de Almeida   +16 more
wiley   +1 more source

A secure cryptographic algorithm against side channel attacks [PDF]

open access: yes, 2015
Historically, a computing resource is scarce and expensive. In the last few decades, considerable efforts have been made to design efficient codes in terms of the storage space and running time.
Abd Ghafar, Amir Hamzah, Abu, Nur Azman
core  

Home - About - Disclaimer - Privacy