Results 61 to 70 of about 65,060 (255)

Photonic Hybrid Integration: Strategies and Promises of Advanced Additive Manufacturing

open access: yesAdvanced Optical Materials, EarlyView.
Heterogeneous photonic integration combines wafer bonding, transfer printing, and advanced multi‐photon lithography to realize compact, adaptable photonic systems. This review highlights breakthroughs in hybrid materials, metrology, and 4D printing, revealing how the convergence of traditional and emerging fabrication unlocks scalable, high‐performance
Zhitian Shi   +3 more
wiley   +1 more source

Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer

open access: yesApplied Sciences, 2018
Oblivious transfer (OT) and bit commitment (BC) are two-party cryptographic protocols which play crucial roles in the construction of various cryptographic protocols. We propose three practical quantum cryptographic protocols in this paper.
Yaqi Song, Li Yang
doaj   +1 more source

Protocols for symmetric secret key establishment: Modern approach

open access: yesVojnotehnički Glasnik, 2022
Introduction/purpose: The problem of efficient distribution of cryptographic keys in communication systems has existed since its first days and is especially emphasized by the emergence of mass communication systems.
Meiran Galis   +3 more
doaj   +1 more source

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, EarlyView.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

Cryptographic protocols in practice [PDF]

open access: yes, 2009
Cílem této práce bylo v první části popsat požadavky na kryptografické protokoly. Dále měla být provedena klasifikace těchto protokolů a uvedeny konkrétní příklady.
Truneček, Petr
core  

Using of small-scale quantum computers in cryptography with many-qubit entangled states

open access: yes, 2004
We propose a new cryptographic protocol. It is suggested to encode information in ordinary binary form into many-qubit entangled states with the help of a quantum computer. A state of qubits (realized, e.g., with photons) is transmitted through a quantum
A. Ekert   +16 more
core   +1 more source

Multi-exponentiation (cryptographic protocols) [PDF]

open access: yesIEE Proceedings - Computers and Digital Techniques, 1994
In several cryptographic protocols the product of a small number of exponentiations is required, but the separate exponentiation results are not needed. A simultaneous exponentiation algorithm that takes advantage of this situation and that is substantially faster than the ordinary approach using separate exponentiations is presented.
S.-M. Yen, C.-S. Laih, A.K. Lenstra
openaire   +1 more source

Generating Dynamic Structures Through Physics‐Based Sampling of Predicted Inter‐Residue Geometries

open access: yesAdvanced Science, EarlyView.
While static structure prediction has been revolutionized, modeling protein dynamics remains elusive. trRosettaX2‐Dynamics is presented to address this challenge. This framework leverages a Transformer‐based network to predict inter‐residue geometric constraints, guiding conformation generation via physics‐based iterative sampling. The resulting method
Chenxiao Xiang   +3 more
wiley   +1 more source

cryptographic Primitives: Insertions, Examples and Open Problems

open access: yesБезопасность информационных технологий, 2014
Cryptographic primitives are considered. Each of cryptographic primitives can be the basis for building more complex cryptographic protocol. Examples of insertion of cryptographic primitives are given. The problems arising at the proof of security of the
Stanislav Olegovich Dordzhiev   +1 more
doaj  

Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols

open access: yesIACR Transactions on Symmetric Cryptology, 2020
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such as multi-party computation and zero knowledge proofs
Abdelrahaman Aly   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy