Now showing items 31-40 of 71
Cryptanalysis of the LAKE hash family
We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitives of LAKE, we show three different collision ...
Response of dispersive cylindrical cloaks to a nonmonochromatic plane wave
The transmission line modeling method is used to get the time domain response of a dispersive cylindrical cloak to an electromagnetic (EM) plane wave that is slightly nonmonochromatic. Our objective is to numerically study ...
Importance of the singular constitutive parameters of cylindrical cloaks : illustration on the anticloak concept
Two-dimensional electromagnetic cloaking devices with infinite optic constants at the inner boundary are investigated. Numerical simulations of this class of ideal cloak, performed with the transmission line modeling method, ...
Optical delay of a signal through a dispersive invisibility cloak
We present a full-wave analysis method on the transmission of a Gaussian light pulse through a spherical invisibility cloak with causal dispersions. The spatial energy distribution of the Gaussian light pulse is distorted ...
Crystallographic structure of the tetratricopeptide repeat domain of Plasmodium falciparum FKBP35 and its molecular interaction with Hsp90 C-terminal pentapeptide
Plasmodium falciparum FK506-binding protein 35 (PfFKBP35) that binds to FK506 contains a conserved tetratricopeptide repeat (TPR) domain. Several known TPR domains such as Hop, PPP5, CHIP, and FKBP52 are structurally ...
An analytical method to study the effects of a substrate in surface-enhanced Raman scattering
In studies of surface-enhanced Raman scattering (SERS), individual metal nanoparticle and particle assemblies introduce enhancement of electromagnetic fields. However, the contributions to enhancement due to the substrate ...
Electromagnetic detection of a perfect invisibility cloak
A perfect invisibility cloak is commonly believed to be undetectable from electromagnetic (EM) detection because it is equivalent to a curved but empty EM space created from coordinate transformation. Based on the intrinsic ...
High directive antenna with virtual aperture
In this article, we propose a spherical shell-core structure which is able to achieve arbitrarily large directivity. The structure is obtained from coordinate transformation. A small antenna can be projected to free space ...
The Sato-Tate conjecture on average for small angles
We obtain average results on the Sato-Tate conjecture for elliptic curves for small angles.
A saddle point approach to the computation of harmonic maps
In this paper we consider numerical approximations of a constraint minimization problem, where the object function is a quadratic Dirichlet functional for vector fields and the interior constraint is given by a convex ...