Results 81 to 90 of about 27,981 (260)

Making Photoresponsive Metal–Organic Frameworks an Effective Class of Heterogeneous Photocatalyst

open access: yesAdvanced Functional Materials, EarlyView.
This review summarizes photoresponsive MOFs for photocatalytic applications, focusing on their capacity to enhance light harvesting, charge transfer, and surface reactions. While existing studies provide foundational insights, emerging characterization techniques enable a deeper understanding of photoresponsive MOFs.
Rui Liu   +3 more
wiley   +1 more source

Side-channel attacks on convolutional neural networks based on the hybrid attention mechanism

open access: yesDiscover Applied Sciences
In the field of security assessment of password chips, side-channel attacks are an important and effective means of extracting sensitive information by analysing the physical characteristics of the chip during operation, providing an important basis for ...
Tao Feng   +3 more
doaj   +1 more source

Side channel attack of cipher chips based on difference variability

open access: yesTongxin xuebao, 2015
Side channel attack (SCA) has the problems of high sample quantity and long analysis time. Noise of side channel leakage and its differential reduction method are researched combined with the architecture of micro control unit (MCU).
Yang ZHANG   +4 more
doaj   +2 more sources

Near Collision Side Channel Attacks [PDF]

open access: yes, 2016
Side channel collision attacks are a powerful method to exploit side channel leakage. Otherwise than a few exceptions, collision attacks usually combine leakage from distinct points in time, making them inherently bivariate. This work introduces the notion of near collisions to exploit the fact that values depending on the same sub-key can have similar
Lejla Batina   +2 more
openaire   +2 more sources

Inter‐Layer Diffusion of Excitations in 2D Perovskites Revealed by Photoluminescence Reabsorption

open access: yesAdvanced Functional Materials, EarlyView.
Inter‐layer diffusion of photoexcitations is monitored in thin films of the 2D perovskite (PEA)2PbI4 by tracking time‐dependent changes in photoluminescence spectra induced by photon reabsorption effects. A low out‐of‐plane excitation diffusion coefficient of 0.26 × 10−4 cm2 s−1 is determined through 1D diffusion modeling.
Jiaxing Du   +7 more
wiley   +1 more source

Behind the Scene of Side Channel Attacks [PDF]

open access: yes, 2013
Since the introduction of side channel attacks in the nineties, a large amount of work has been devoted to their effectiveness and efficiency improvements. On the one side, general results and conclusions are drawn in theoretical frameworks, but the latter ones are often set in a too ideal context to capture the full complexity of an attack performed ...
Emmanuel Prouff   +2 more
openaire   +2 more sources

Scaling‐Up of Structural Superlubricity: Challenges and Opportunities

open access: yesAdvanced Functional Materials, EarlyView.
At increasing length‐scales, structural superlubricity (SSL) faces challenges from physical and chemical energy dissipation pathways. This study reviews recent experimental and theoretical progress on these challenges facing the scaling‐up of SSL, as well as perspectives on future directions for realizing and manipulating macroscale superlubricity ...
Penghua Ying   +4 more
wiley   +1 more source

Over 18% Efficiency from Halogen‐Free Solvent‐Processed Polymer Solar Cells Enabled by Asymmetric Small Molecule Acceptors with Fluoro‐Thienyl Extended Terminal

open access: yesAdvanced Functional Materials, EarlyView.
An asymmetric non‐fullerene acceptor BTP‐FT is developed by extending the end group of Y6‐BO with thiophene. The conformation of the molecule is determined by the noncovalent F···S interaction as demonstrated by 2D NMR and simulations. An efficiency of 18.39% is achieved in the resulting ternary solar cells processed from toluene.
Jingnan Wu   +14 more
wiley   +1 more source

Protecting Secure Communication Under UAV Smart Attack With Imperfect Channel Estimation

open access: yesIEEE Access, 2018
In this paper, we investigate a secure communication system, where one transmitter sends some confidential message to one receiver, under the smart attack from one unmanned aerial vehicle (UAV).
Chao Li   +3 more
doaj   +1 more source

Side-Channel Attacks on Cryptographic Software [PDF]

open access: yesIEEE Security & Privacy Magazine, 2009
When it comes to cryptographic software, side channels are an often-overlooked threat. A side channel is any observable side effect of computation that an attacker could measure and possibly influence. Crypto is especially vulnerable to side-channel attacks because of its strict requirements for absolute secrecy.
openaire   +2 more sources

Home - About - Disclaimer - Privacy