Results 41 to 50 of about 1,355 (213)

Perturbation-Based Schemes with Ultra-Lightweight Computation to Protect User Privacy in Smart Grid

open access: yesInternational Journal of Distributed Sensor Networks, 2013
In smart grid, smart meters are deployed to collect power consumption data periodically, and the data are analyzed to improve the efficiency of power transmission and distribution.
Wei Ren, Liangli Ma, Yi Ren
doaj   +1 more source

One-time memory from isolated Majorana islands

open access: yesNew Journal of Physics, 2022
A one-time memory (OTM) stores two bits such that either bit can be retrieved, but not both. One-time memories have been shown to allow for secure classical and quantum computations.
Sourav Kundu, Ben Reichardt
doaj   +1 more source

Temporal Dynamics Makes Memristive Physical Unclonable Functions More Secure and Ultra‐Lightweight

open access: yesAdvanced Electronic Materials, Volume 11, Issue 20, December 3, 2025.
A temporal PUF (TPUF) is reported, using the randomness of temporal dynamics of memristors as an entropy source. By exploiting temporal complexity, significant reduction of hardware overhead is achieved in the TPUF, from otherwise at least hundreds‐of‐memristors‐scale crossbar arrays to only a pair of memristors.
Yunpeng Guo, Cheng Ma, Huanglong Li
wiley   +1 more source

Portable PGAS‐Based GPU‐Accelerated Branch‐And‐Bound Algorithms at Scale

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 25-26, 30 November 2025.
ABSTRACT The Branch‐and‐Bound (B&B) technique plays a key role in solving many combinatorial optimization problems, enabling efficient problem‐solving and decision‐making in a wide range of applications. It incrementally constructs a tree by building candidates to the solutions and abandoning a candidate as soon as it determines that it cannot lead to ...
Guillaume Helbecque   +4 more
wiley   +1 more source

The Symmetrical Block Rsb-32 Encryption Algorithm With Dynamic Encryption Settings.

open access: yesÌнформаційні технології в освіті, 2009
An iterative algorithm used with variable block size of public key encryption, multiple 32-m bits. Encrypt text runs in steps. As cryptographic primitives are used: stochastic scrolling block, bi-directional sliding coding, nonlinear and stochastic ...
A. Beletsky, A. Beletsky
doaj  

Hardware Security for Edge Computing Via CMOS‐Compatible Multi‐Level Flash Memory with Hash‐Based Key Generation

open access: yesAdvanced Electronic Materials, Volume 11, Issue 19, November 18, 2025.
A CMOS‐compatible flash memory structure with multi‐level programming produces reliable and reproducible physically unclonable functions (PUFs) for secure IoT applications. Device‐specific variations in flat‐band voltage enable scalable key generation without standby power.
Kyumin Sim   +6 more
wiley   +1 more source

Fragme∩t: An Open‐Source Framework for Multiscale Quantum Chemistry Based on Fragmentation

open access: yesWIREs Computational Molecular Science, Volume 15, Issue 6, November/December 2025.
This review introduces a new open‐source Python framework for rapid validation and prototyping of fragment‐based quantum chemistry methods, designed to be easy to deploy and modify by non‐experts. It is based on a foundation of the generalized many‐body expansion, which can encompass numerous fragmentation methods, combined with energy screening that ...
Dustin R. Broderick   +8 more
wiley   +1 more source

Multikey Verifiable Homomorphic Encryption

open access: yesIEEE Access, 2022
A homomorphic encryption (HE) scheme is an advanced encryption technology which allows any user receiving ciphertexts to perform computations over them in a public manner. An important application of an HE scheme is a private delegating computation where
Yi Lu, Keisuke Hara, Keisuke Tanaka
doaj   +1 more source

CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives (full version) [PDF]

open access: green, 2022
Joel Kuepper   +11 more
openalex   +1 more source

Hardware Design for Secure Telemedicine Using A Novel Framework, A New 4D Memristive Chaotic Oscillator, and Dispatched Gray Code Scrambler

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
This work presents a secure telemedicine cryptosystem based on a novel 4D memristive chaotic oscillator and a Dispatched Gray Code Scrambler (DGCS). Implemented on FPGA, the system ensures power‐efficient encryption, making it suitable for real‐time medical image transmission in IoT healthcare environments.
Fritz Nguemo Kemdoum   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy