This dataverse is a collection of the School of Physical and Mathematical Sciences’ research data.

Featured Dataverses

In order to use this feature you must have at least one published dataverse.

Publish Dataverse

Are you sure you want to publish your dataverse? Once you do so it must remain published.

Publish Dataverse

This dataverse cannot be published because the dataverse it is in has not been published.

Delete Dataverse

Are you sure you want to delete your dataverse? You cannot undelete this dataverse.

Advanced Search

6,831 to 6,840 of 7,954 Results
Markdown Text - 6.3 KB - MD5: 85dbd5683945bb500a2eadf29e40ce59
Documentation
PNG Image - 16.9 KB - MD5: 37b7a14d84dc165248c70aa1bb238a6e
Sep 9, 2020 - HE Huajun
He, Huajun; Sum, Tze Chien, 2020, "Replication Data for: Halide Perovskite Nanocrystals for Multiphoton Applications", https://doi.org/10.21979/N9/OOTXQG, DR-NTU (Data), V1
Halide perovskite nanocrystals (NCs) are a unique class of NCs with novel properties distinct from traditional semiconductor NCs. These exceptional properties of defect tolerance, large absorption coefficients, high brightness, and narrow emission linewidths stem from their atypi...
RAR Archive - 1.9 MB - MD5: 2a48beff9e42e091a6896fb7d20f1bb3
Aug 2, 2020 - Wang Haoyang
Thomas Peyrin; Haoyang Wang, 2020, "Replication data for: The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers", https://doi.org/10.21979/N9/X0P4YG, DR-NTU (Data), V1
Inserting backdoors in encryption algorithms has long seemed like a very interesting, yet difficult problem. Most attempts have been unsuccessful for symmetric-key primitives so far and it remains an open problem how to build such ciphers. In this work, we propose the MALICIOUS f...
Python Source Code - 7.7 KB - MD5: 7dade11177a0dc6971f98f3acbe76d31
Markdown Text - 492 B - MD5: bb0ce85ce5d10cdcecdc298b87a96bcc
Python Source Code - 4.7 KB - MD5: 80400590c7f34863437c54385066c8ee
Aug 2, 2020 - Wang Haoyang
Zhenzhen Bao; Ling Ding; Jian Guo; Haoyang Wang; Wenying Zhang, 2020, "Replication data for: Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes", https://doi.org/10.21979/N9/JYECIO, DR-NTU (Data), V1
Hashing modes are ways to convert a block cipher into a hash function, and those with AES as the underlying block cipher are referred to as AES hashing modes. Sasaki in 2011 introduced the first preimage attack against AES hashing modes with the AES block cipher reduced to 7 roun...
Add Data

Log in to create a dataverse or add a dataset.

Share Dataverse

Share this dataverse on your favorite social media networks.

Link Dataverse
Reset Modifications

Are you sure you want to reset the selected metadata fields? If you do this, any customizations (hidden, required, optional) you have done will no longer appear.