Results 61 to 70 of about 1,519 (205)

Effective Stabilization of Organic Cathodes Through Formation of a Protective Solid Electrolyte Interface Layer via Reduction

open access: yesChemSusChem, Volume 18, Issue 7, April 1, 2025.
This study investigates the dilithium salt of 2,5‐dihydroxy‐1,4‐benzoquinone as a cathode material for lithium‐ion batteries. Rapid capacity decay due to morphological damage is mitigated by promoting a protective SEI layer through a lower discharge cutoff voltage. Cycling at a discharge cutoff voltage of 0.5 V significantly improves battery stability.
Yonglin Wang   +4 more
wiley   +1 more source

RISC-V Based Keccak Co-Processor for NIST Post-Quantum Cryptography Standards [PDF]

open access: yes
This paper presents the design and implementation of a RISC-V-based Keccak co-processor optimized for Post-Quantum Cryptography (PQC) algorithms.
Dolmeta, Alessandra   +4 more
core   +1 more source

Interface engineering of inorganic solid‐state lithium batteries via atomic and molecular layer deposition

open access: yesInfoMat, Volume 7, Issue 4, April 2025.
The interface challenges between inorganic solid electrolytes and electrodes (such as high resistance, poor contact, side reactions at the interface, and stress/strain changes) are critical factors influencing the performance of solid‐state batteries. Over decades of development, atomic and molecular layer deposition (ALD and MLD) has been considered a
Huaihu Sun   +3 more
wiley   +1 more source

Falcon/Kyber and Dilithium/Kyber Network Stack on Nvidia’s Data Processing Unit Platform [PDF]

open access: yes
Commercially available quantum computers are expected to reshape the world in the near future. They are said to break conventional cryptographic security mechanisms that are deeply embedded in our today’s communication.
Arnal I Clemente, Xavi   +7 more
core   +3 more sources

Rejected Signatures’ Challenges Pose New Challenges: Key Recovery of CRYSTALS-Dilithium via Side-Channel Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Rejection sampling is a crucial security mechanism in lattice-based signature schemes that follow the Fiat-Shamir with aborts paradigm, such as MLDSA/ CRYSTALS-Dilithium.
Yuanyuan Zhou   +3 more
doaj   +1 more source

Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley   +1 more source

A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT Applications

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Lattice-Based Cryptography (LBC) schemes, like CRYSTALS-Kyber and CRYSTALS-Dilithium, have been selected to be standardized in the NIST Post-Quantum Cryptography standard.
Zewen Ye   +5 more
doaj   +1 more source

Benchmarking and Integration of NIST Post-Quantum Cryptography on Android Devices [PDF]

open access: yesEPJ Web of Conferences
In recent years, there has been spontaneous development in practical quantum computing. This poses a serious risk to today’s cryptographic infrastructure, especially on mobile platforms.
Chatterjee Snehil   +7 more
doaj   +1 more source

Cybersecurity and Artificial Intelligence in Unmanned Aerial Vehicles: Emerging Challenges and Advanced Countermeasures

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The increasing adoption of artificial intelligence (AI)‐driven unmanned aerial vehicles (UAVs) in military, commercial, and surveillance operations has introduced significant security challenges, including cyber threats, adversarial AI attacks, and communication vulnerabilities. This paper presents a comprehensive review of the key security threats and
Deafallah Alsadie, Jiwei Tian
wiley   +1 more source

Post‐Quantum Digital Signatures for Enhanced Medical Image Security

open access: yesIET Quantum Communication, Volume 6, Issue 1, January/December 2025.
This study explores the use of Sphincs+, Dilithium, and Falcon to enhance the security of medical images against quantum threats. By leveraging digital signatures for authentication and integrity verification, the proposed approach mitigates risks of tampering and ensures the reliability of healthcare records.
Kumar Sekhar Roy   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy