搜索结果: 1-15 共查到“Limits”相关记录294条 . 查询时间(0.367 秒)
Metamaterials research challenges fundamental limits in photonics
metamaterials photonics photonics
2021/8/11
Researchers are proposing a new way to modulate both the absorptive and the refractive qualities of metamaterials in real time, and their findings open intriguing new opportunities to control, in time...
What limits the ability of plants to draw water from dry soil?(图)
limits ability plants draw water dry soil
2020/5/15
What limits the ability of plants to draw water from dry soil? That's the question California State University, Fullerton plant biologist H. Jochen Schenk and his collaborators addressed in a study su...
How small is the tiniest possible particle of ice? According to new NSF-funded research published in the journal Proceedings of the National Academy of Sciences, the smallest nanodroplet of water in w...
Nanocellulose for Energy Storage Systems: Beyond the Limits of Synthetic Materials
bacterial cellulose cellulose nanocrystals cellulose nanofibrils energy storage systems nanocellulose
2024/3/8
The ongoing surge in demand for high-performance energy storage systems inspires the relentless pursuit of advanced materials and structures. Components of energy storage systems are generally based o...
Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations
Side-Channel Attacks Security Evaluations Certification
2019/9/16
We take advantage of a recently published open source implementation of the AES protected with a mix of countermeasures against side-channel attacks to discuss both the challenges in protecting COTS d...
Limits to Non-Malleability
non-malleable codes black box impossibility tamper-resilient cryptography
2019/5/9
There have been many successes in constructing explicit non-malleable codes for various classes of tampering functions in recent years, and strong existential results are also known. In this work we a...
Full Collision Attack: Pushing the Limits of Exhaustible Key Spaces
FCA full collision group collision attack
2019/1/9
Recovering keys efficiently from far beyond exhaustible candidate spaces is a meaningful but very challenging topic in Side-Channel Attacks (SCA). Recent methods often utilize collision optimizations ...
Deconstructing the Blockchain to Approach Physical Limits
Blockchains physical limits deconstruction
2018/11/5
Transaction throughput, confirmation latency and confirmation reliability are fundamental performance measures of any blockchain system in addition to its security. In a decentralized setting, these m...
Limits of Practical Sublinear Secure Computation
Secure Computation Private Information Retrieval Sublinear Communication
2018/6/6
Secure computations on big data call for protocols that have sublinear communication complexity in the input length. While fully homomorphic encryption (FHE) provides a general solution to the problem...
Limits on the Power of Garbling Techniques for Public-Key Encryption
Public-key encryption one-way function black-box constructions non-black-box separations
2018/6/5
Understanding whether public-key encryption can be based on one-way functions is a fundamental open problem in cryptography. The seminal work of Impagliazzo and Rudich [STOC'89] shows that black-box c...
Entering the Fast Lane—MXene Electrodes Push Charging Rate Limits in Energy Storage
Entering the Fast Lane MXene Electrodes Charging Rate Limits Energy Storage
2017/7/24
Can you imagine fully charging your cell phone in just a few seconds? Researchers in Drexel University’s College of Engineering can, and they took a big step toward making it a reality with their rece...
FROM DAGUERREOTYPES TO DIGITAL AUTOMATIC PHOTOGRAMMETRY. APPLICATIONS AND LIMITS FOR THE BUILT HERITAGE PROJECT
Photogrammetry photography conservation restoration
2017/6/20
This paper will describe the evolutionary stages that shaped and built, over the time, a robust and solid relationship between ‘indirect survey methods’ and knowledge of the ‘architectural matter’, ai...
Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation)
pseudorandom generators local computation obfuscation
2017/4/12
As a corollary, we refute some conjectures recently made in the cryptographic literature. This includes refuting the assumptions underlying Lin and Tessaro's recently proposed candidate construction f...