Results 61 to 70 of about 367,345 (251)
Multikey Verifiable Homomorphic Encryption
A homomorphic encryption (HE) scheme is an advanced encryption technology which allows any user receiving ciphertexts to perform computations over them in a public manner. An important application of an HE scheme is a private delegating computation where
Yi Lu, Keisuke Hara, Keisuke Tanaka
doaj +1 more source
Temporal Dynamics Makes Memristive Physical Unclonable Functions More Secure and Ultra‐Lightweight
A temporal PUF (TPUF) is reported, using the randomness of temporal dynamics of memristors as an entropy source. By exploiting temporal complexity, significant reduction of hardware overhead is achieved in the TPUF, from otherwise at least hundreds‐of‐memristors‐scale crossbar arrays to only a pair of memristors.
Yunpeng Guo, Cheng Ma, Huanglong Li
wiley +1 more source
Portable PGAS‐Based GPU‐Accelerated Branch‐And‐Bound Algorithms at Scale
ABSTRACT The Branch‐and‐Bound (B&B) technique plays a key role in solving many combinatorial optimization problems, enabling efficient problem‐solving and decision‐making in a wide range of applications. It incrementally constructs a tree by building candidates to the solutions and abandoning a candidate as soon as it determines that it cannot lead to ...
Guillaume Helbecque +4 more
wiley +1 more source
A CMOS‐compatible flash memory structure with multi‐level programming produces reliable and reproducible physically unclonable functions (PUFs) for secure IoT applications. Device‐specific variations in flat‐band voltage enable scalable key generation without standby power.
Kyumin Sim +6 more
wiley +1 more source
A Novel Identity-Based Signcryption Scheme in the Standard Model
Identity-based signcryption is a useful cryptographic primitive that provides both authentication and confidentiality for identity-based crypto systems. It is challenging to build a secure identity-based signcryption scheme that can be proven secure in a
Yueying Huang, Junjie Yang
doaj +1 more source
CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives [PDF]
Joel Kuepper +11 more
openalex +1 more source
Energy-efficient cryptographic primitives
Our society greatly depends on services and applications provided by mobile communication networks. As billions of people and devices become connected, it becomes increasingly important to guarantee security of interactions of all players. In this talk we address several aspects of this important, many-folded problem.
openaire +2 more sources
Fragme∩t: An Open‐Source Framework for Multiscale Quantum Chemistry Based on Fragmentation
This review introduces a new open‐source Python framework for rapid validation and prototyping of fragment‐based quantum chemistry methods, designed to be easy to deploy and modify by non‐experts. It is based on a foundation of the generalized many‐body expansion, which can encompass numerous fragmentation methods, combined with energy screening that ...
Dustin R. Broderick +8 more
wiley +1 more source
This work presents a secure telemedicine cryptosystem based on a novel 4D memristive chaotic oscillator and a Dispatched Gray Code Scrambler (DGCS). Implemented on FPGA, the system ensures power‐efficient encryption, making it suitable for real‐time medical image transmission in IoT healthcare environments.
Fritz Nguemo Kemdoum +3 more
wiley +1 more source
Open and Closed Loop Approaches for Energy Efficient Quantum Optimal Control
Concepts from quantum thermodynamics and optimal control are blended to derive a theoretical framework to quantify and minimize the energetic cost of a pulse for unitary synthesis. Two complementary techniques (based on GRAPE and Reinforce‐DRL) are implemented as open‐source software that co‐optimizes the fidelity and energetic cost within quantum ...
Sebastiaan Fauquenot +2 more
wiley +1 more source

