The flow field is a pivotal part to manage the transport of water and gas in proton exchange membrane fuel cell. However, the reported water measurement methods (e.g., X-ray and electrochemical impedance spectroscopy (EIS)) cannot give a comprehensive understanding water distribution in the flow field, resulting in challenges in optimizing the channel design and enhancing fuel cell performance. Therefore, we propose a water measurement method combining the X-ray radiography with EIS to investigate the effect of different operating conditions on the growth law and distribution of liquid water in parallel and serpentine flow fields. The attenuation coefficient of liquid water to X-ray is calibrated with constant tube-current and tube-voltage of X-ray generator. Besides, the parallel flow field with hydrophobic treatment is studied. The results show that the water accumulation of the parallel flow field is far more than the serpentine flow field, and the water content of the middle region is higher than that of other regions in the parallel flow field. Furthermore, operating conditions (cathode inlet gas flow rate, inlet gas humidity, and back pressure) have little effect on the liquid water content of the middle region in the parallel flow field. The polarization curve, EIS result, and X-ray radiography show that the performance and water drainage capacity of the hydrophobic parallel flow field are better than the normal one.
In this paper, we study the RSA public key cryptosystem in a special case with the private exponent d larger than the public exponent e. When N0.258 ⩽ e ⩽ N0.854, d > e and satisfies the given conditions, we can perform cryptanalytic attacks based on the LLL lattice basis reduction algorithm.
The idea is an extension of Boneh and Durfee’s researches on low private key RSA, and provides a new solution to finding weak
keys in RSA cryptosystems.
Supported partially by the National Basic Research Program of China (Grant No. 2003CB314805), the National Natural Science
Foundation of China (Grant Nos. 90304014 and 60873249), and the Project funded by Basic Research Foundation of School of Information
Science and Technology of Tsinghua 相似文献
In this paper,we study the RSA public key cryptosystem in a special case with the private exponent d larger than the public exponent e. When N0.258 e N0.854,d > e and satisfies the given conditions,we can perform cryptanalytic attacks based on the LLL lattice basis reduction algorithm. The idea is an extension of Boneh and Durfee's researches on low private key RSA,and provides a new solution to finding weak keys in RSA cryptosystems. 相似文献
Secure multiparty computation has become a central research focus in the international cryptographic community. Secure comparing two sets is an important problem in secure multiparty computation. The research on privately determining whether two sets are equal has not been investigated. This study solves the problem by mapping these sets into natural numbers and then comparing correspond- ing numbers, We propose two secure multiparty computation protocols for comparing two sets. It is proved by well-accepted simulation paradigm that these solutions are private in semi-honest model. These solutions have important significance in constructing other secure multiparty computation protocols. 相似文献
In this paper a new notch filter topology has firstly been described. In order to improve the input match as well as enhance the gain on the operating frequency of 20.5 GHz, extra capacitor has firstly been added in the passive base-collector notch filter forming a new scheme, eliminating the operating-frequency (op) input mismatch in formal base-collector notch filters. EM simulations have shown that the LNA obtained 14.1 dB gain at 20.5 GHz and high image-rejection ratio (IRR) of 33.5 dB at image frequency of 15 GHz, and S11 of -15 dB was obtained compared to −8 dB without notch filter at operating frequency, NF was below 5 dB at gain peak frequency, power consumption was 18 mW at 3 V voltage supply, and IIP3 was 3.43 dBm ensuring a high linearity in SiGe bipolar process. 相似文献
Finding the solution to a general multivariate modular linear equation plays an important role in cryptanalysis field. Earlier results show that obtaining a relatively short solution is possible in polynomial time. However, one problem arises here that if the equation has a short solution in given bounded range, the results outputted by earlier algorithms are often not the ones we are interested in. In this paper, we present a probability method based on lattice basis reduction to solve the problem. For a g... 相似文献