Results 91 to 100 of about 336,639 (325)
Software Grand Exposure: SGX Cache Attacks Are Practical
Side-channel information leakage is a known limitation of SGX. Researchers have demonstrated that secret-dependent information can be extracted from enclave execution through page-fault access patterns.
Brasser, Ferdinand+5 more
core
This work explores Li‐substituted P2 layered oxides for Na‐ion batteries by crystallographic and electrochemical studies. The effect of lithium on superstructure orderings, on phase transitions during synthesis and electrochemical cycling and on the interplay of O‐ versus TM‐redox is revealed via various advanced techniques, including semi‐simultaneous
Mingfeng Xu+5 more
wiley +1 more source
Template attack of Crypto chip based on clustering
The known-key establishment template and others full control of experimental equipment preconditions are required to implement the traditional template attack.The preconditions restrict the application scenario of template attack.The template attack is ...
Zhen WU+3 more
doaj +2 more sources
The THz drive of the Mott insulating state of a rare‐earth nickelate induces instantaneous insulator‐metal transition via quantum tunneling of valence electrons across the bandgap. This transition is pure electronic and highly non‐thermal, which may find its applications in ultrafast opto‐electronics with enhanced performance and minimal device size ...
Gulloo Lal Prajapati+7 more
wiley +1 more source
High‐Entropy Magnetism of Murunskite
The study of murunskite (K2FeCu3S4) reveals that its magnetic and orbital order emerges in a simple I4/mmm crystal structure with complete disorder in the transition metal positions. Mixed‐valence Fe ions randomly occupy 1/4 of the tetrahedral sites, with the remaining 3/4 being filled by non‐magnetic Cu+ ions.
Davor Tolj+18 more
wiley +1 more source
Which Chromium–Sulfur Compounds Exist as 2D Material?
2D chromium sulfides synthesized using molecular beam epitaxy on graphene. Structural characterization reveals two novel 2D materials, Cr2S3‐2D, which lacks a direct bulk counterpart, and Cr223S${\rm Cr}_{2\frac{2}{3}}{\rm S}$4‐2D, a minimum thickness version of Cr5S6. However, attempts to synthesize CrS2 are unsuccessful. Both new 2D phases are stable
Affan Safeer+5 more
wiley +1 more source
Smart Home Privacy Protection Methods against a Passive Wireless Snooping Side-Channel Attack. [PDF]
Nassiri Abrishamchi MA+4 more
europepmc +1 more source
Iridium Oxide Inverse Opal Anodes with Tailored Porosity for Efficient PEM Electrolysis
The synthesis of Iridium‐based Inverse Opals (Ir‐IO) is reported as electrocatalyst for Proton exchange membrane water electrolysis (PEM‐WE). Using the developed protocol it produces highly porous materials consisting either of metallic, oxidic Iridium or a combination thereof with large surface areas.
Sebastian Möhle+2 more
wiley +1 more source
Tight and Scalable Side-Channel Attack Evaluations through Asymptotically Optimal Massey-like Inequalities on Guessing Entropy. [PDF]
Tănăsescu A+3 more
europepmc +1 more source
Poly(heptazine) imides (PHIs), a crystalline carbon nitride subclass, intercalate metals to deliver high stability, tunable electronics, and efficient charge separation. These features enable solar‐driven applications such as hydrogen evolution, CO₂ reduction, and organic synthesis.
Gabriel A. A. Diab+6 more
wiley +1 more source