Results 71 to 80 of about 1,481 (187)
The increasing adoption of artificial intelligence (AI)‐driven unmanned aerial vehicles (UAVs) in military, commercial, and surveillance operations has introduced significant security challenges, including cyber threats, adversarial AI attacks, and communication vulnerabilities. This paper presents a comprehensive review of the key security threats and
Deafallah Alsadie, Jiwei Tian
wiley +1 more source
Post‐Quantum Digital Signatures for Enhanced Medical Image Security
This study explores the use of Sphincs+, Dilithium, and Falcon to enhance the security of medical images against quantum threats. By leveraging digital signatures for authentication and integrity verification, the proposed approach mitigates risks of tampering and ensures the reliability of healthcare records.
Kumar Sekhar Roy +5 more
wiley +1 more source
Optimized Design and Implementation of CRYSTALS‐KYBER Based on MLWE
CRYSTALS‐KYBER is a postquantum key exchange mechanism based on the MLWE problem. At present, it is a major challenge to realize CRYSTALS‐KYBER with high‐performance and low‐resource consumption on the FPGA platform. The design proposed in this paper aims at the high efficiency implementation of CRYSTALS‐KYBER based on the MLWE scheme.
Song Cheng +7 more
wiley +1 more source
Life Cycle of LiFePO4 Batteries: Production, Recycling, and Market Trends
This review investigates various synthesis methods for LiFePO4 (LFP) as a cathode material for lithium‐ion batteries, highlighting its advantages over Co and Ni due to lower toxicity and cost. It also explores recycling techniques for waste LFP batteries, emphasizing the need for efficient recycling to prevent environmental harm, conserve resources ...
Hossein Rostami +4 more
wiley +1 more source
Number Theoretic Transform (NTT) enables speeding up polynomial multiplications, thereby accelerating the implementation of lattice-based post-quantum cryptography (PQC) algorithms.
Duc-Thuan Dam +5 more
doaj +1 more source
Main Group Metal Complexes of Si, Ge and Al with an Unsymmetrical N,N’‐Substituted Diamide Ligand
The unsymmetrical diamine N‐ethyl‐2‐(n‐propylaminomethyl)phenylamine was prepared and used to synthesize different unsymmetric silicon, germanium and aluminium amides, including a methylaluminiumdiamide, a dimeric amido‐germylene and a chiral amido‐cyclotetrasilane.
Martin Pracht +7 more
wiley +1 more source
High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature
In this work, we present a well-optimized GPU implementation of Dilithium, one of the NIST post-quantum standard digital signature algorithms. We focus on warp-level design and exploit several strategies to improve performance, including memory pool ...
Dai, Wangchen +4 more
core
Lightweight Hardware Accelerator for Post-Quantum Digital Signature CRYSTALS-Dilithium [PDF]
The looming threat of an adversary with Quantum computing capability led to a worldwide research effort towards identifying and standardizing novel post-quantum cryptographic primitives.
Anupam Chattopadhyay +3 more
core
In this study, the exceptional cycling stability of small‐molecule polycyclic aromatic hydrocarbon (SMPAH) anodes in lithium‐ion batteries is demonstrated. It is also revealed that pyrene, unlike other SMPAHs, undergoes significant structural shifts during lithium intercalation, causing irreversible expansion and dissolution into the electrolyte ...
Avi Arya +6 more
wiley +1 more source
An Efficient Quantum Blockchain Framework With Edge Computing for Privacy-Preserving 6G Networks
The advent of 6G networks places very high demands on ultra-low latency, high throughput, and quantum-secure communication to power Industry 5.0 use cases.
Kranthi Kumar Singamaneni +4 more
doaj +1 more source

