搜索结果: 1-15 共查到“limits”相关记录294条 . 查询时间(0.07 秒)
![](http://www.firstlight.cn/upload/imgfile/20236/8/2023681765136.jpg)
![](http://www.firstlight.cn/upload/imgfile/20235/22/2023522103119460.jpg)
Metamaterials research challenges fundamental limits in photonics
metamaterials photonics photonics
2021/8/11
Researchers are proposing a new way to modulate both the absorptive and the refractive qualities of metamaterials in real time, and their findings open intriguing new opportunities to control, in time...
![](http://www.firstlight.cn/upload/imgfile/20205/15/202051583623678.jpg)
What limits the ability of plants to draw water from dry soil?(图)
limits ability plants draw water dry soil
2020/5/15
What limits the ability of plants to draw water from dry soil? That's the question California State University, Fullerton plant biologist H. Jochen Schenk and his collaborators addressed in a study su...
![](http://www.firstlight.cn/upload/imgfile/201911/15/2019111594640253.jpg)
How small is the tiniest possible particle of ice? According to new NSF-funded research published in the journal Proceedings of the National Academy of Sciences, the smallest nanodroplet of water in w...
Nanocellulose for Energy Storage Systems: Beyond the Limits of Synthetic Materials
bacterial cellulose cellulose nanocrystals cellulose nanofibrils energy storage systems nanocellulose
2024/3/8
The ongoing surge in demand for high-performance energy storage systems inspires the relentless pursuit of advanced materials and structures. Components of energy storage systems are generally based o...
Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations
Side-Channel Attacks Security Evaluations Certification
2019/9/16
We take advantage of a recently published open source implementation of the AES protected with a mix of countermeasures against side-channel attacks to discuss both the challenges in protecting COTS d...
Limits to Non-Malleability
non-malleable codes black box impossibility tamper-resilient cryptography
2019/5/9
There have been many successes in constructing explicit non-malleable codes for various classes of tampering functions in recent years, and strong existential results are also known. In this work we a...
Full Collision Attack: Pushing the Limits of Exhaustible Key Spaces
FCA full collision group collision attack
2019/1/9
Recovering keys efficiently from far beyond exhaustible candidate spaces is a meaningful but very challenging topic in Side-Channel Attacks (SCA). Recent methods often utilize collision optimizations ...
Deconstructing the Blockchain to Approach Physical Limits
Blockchains physical limits deconstruction
2018/11/5
Transaction throughput, confirmation latency and confirmation reliability are fundamental performance measures of any blockchain system in addition to its security. In a decentralized setting, these m...
Limits of Practical Sublinear Secure Computation
Secure Computation Private Information Retrieval Sublinear Communication
2018/6/6
Secure computations on big data call for protocols that have sublinear communication complexity in the input length. While fully homomorphic encryption (FHE) provides a general solution to the problem...
Limits on the Power of Garbling Techniques for Public-Key Encryption
Public-key encryption one-way function black-box constructions non-black-box separations
2018/6/5
Understanding whether public-key encryption can be based on one-way functions is a fundamental open problem in cryptography. The seminal work of Impagliazzo and Rudich [STOC'89] shows that black-box c...
Entering the Fast Lane—MXene Electrodes Push Charging Rate Limits in Energy Storage
Entering the Fast Lane MXene Electrodes Charging Rate Limits Energy Storage
2017/7/24
Can you imagine fully charging your cell phone in just a few seconds? Researchers in Drexel University’s College of Engineering can, and they took a big step toward making it a reality with their rece...
FROM DAGUERREOTYPES TO DIGITAL AUTOMATIC PHOTOGRAMMETRY. APPLICATIONS AND LIMITS FOR THE BUILT HERITAGE PROJECT
Photogrammetry photography conservation restoration
2017/6/20
This paper will describe the evolutionary stages that shaped and built, over the time, a robust and solid relationship between ‘indirect survey methods’ and knowledge of the ‘architectural matter’, ai...
Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation)
pseudorandom generators local computation obfuscation
2017/4/12
As a corollary, we refute some conjectures recently made in the cryptographic literature. This includes refuting the assumptions underlying Lin and Tessaro's recently proposed candidate construction f...