Results 101 to 110 of about 133,184 (295)

Horizontal Collision Correlation Attack on Elliptic Curves [PDF]

open access: yes, 2014
Elliptic curves based algorithms are nowadays widely spread among embedded systems. They indeed have the double advantage of providing efficient implementations with short certificates and of being relatively easy to secure against side-channel attacks.
Éliane Jaulmes   +3 more
openaire   +2 more sources

Engineering Electrical Transport by Implantation‐Induced Defects in CrN Films Without Affecting Thermal Conductivity

open access: yesAdvanced Materials Interfaces, EarlyView.
This study demonstrates how implantation‐induced defects in CrN thin films enable controlled tuning of electrical transport from metallic to semiconductor‐like behavior while preserving thermal conductivity. Through cumulative argon implantation, defect landscapes are engineered to manipulate carrier mobility and conduction mechanisms, revealing key ...
Hugo Bouteiller   +8 more
wiley   +1 more source

Quantum Random Oracle Model for Quantum Public-Key Encryption

open access: yesIEEE Access, 2019
Random oracle model is a general security analysis tool for rigorous security proof and effective cryptographic protocol design. In the quantum world, the attempts of constructing a quantum random oracle (QRO) have been made, such as quantum-accessible ...
Tao Shang, Ranyiliu Chen, Qi Lei
doaj   +1 more source

Unlocking Spin Dynamics: Spin‐Orbit Coupling Driven Spin State Interconversion in Carbazole‐Containing TADF Emitters

open access: yesAdvanced Optical Materials, EarlyView.
This study explores overlapping charge transport mechanisms in TADF materials and identifies spin‐orbit coupling as the dominant mechanism for triplet‐to‐singlet transition in carbazole‐based cyanoarene emitters. Computational investigations reveal a second spin‐orbit‐coupling‐mediated reverse intersystem crossing pathway, significantly enhancing the ...
Annika Morgenstern   +13 more
wiley   +1 more source

Breaking and making quantum money: toward a new quantum cryptographic protocol [PDF]

open access: yes, 2009
Public-key quantum money is a cryptographic protocol in which a bank can create quantum states which anyone can verify but no one except possibly the bank can clone or forge.
Aaronson, Scott   +6 more
core   +1 more source

Preserving Both Privacy and Utility in Network Trace Anonymization

open access: yes, 2018
As network security monitoring grows more sophisticated, there is an increasing need for outsourcing such tasks to third-party analysts. However, organizations are usually reluctant to share their network traces due to privacy concerns over sensitive ...
Adam   +22 more
core   +1 more source

Hundreds of Nanocoulomb Electron Acceleration Driven by Multipetawatt Laser in Subcritical Density Plasmas

open access: yesAdvanced Photonics Research, EarlyView.
Electron acceleration using multipetawatt femtosecond lasers and subcritical density plasmas achieves a maximum charge of 245 nC, with an injection rate of up to 100 nC per picosecond. The charge variation with plasma density, initially increasing and then decreasing, arises from the competition between the injection of multiple plasma waves and laser ...
Xi‐Chen Hu   +9 more
wiley   +1 more source

Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis

open access: yesJournal of Applied Mathematics, 2013
At AES’00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis.
Jinkeon Kang   +4 more
doaj   +1 more source

Optimizing Fast Near Collision Attack on Grain Using Linear Programming

open access: yesIEEE Access, 2019
In 2018, an attack named fast-near-collision attack (FNCA) was proposed, which is an improved version of near-collision attack (NCA) on Grain-v1, one of the three hardware-oriented finalists of the eSTREAM project.
Senshan Pan, Yueping Wu, Liangmin Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy