Results 81 to 90 of about 1,481 (187)

Redetermination of the low-temperature polymorph of Li2MnSiO4 from single-crystal X-ray data

open access: yesActa Crystallographica Section E, 2012
Crystals of dilithium manganese(II) silicate were grown under high-temperature hydrothermal conditions in the system LiOH—MnO2—SiO2. The title compound crystallizes in the βII-Li3PO4 structure type. The coordination polyhedra
Mineo Sato   +4 more
doaj   +1 more source

Photovoltaic Lithium-ion Battery with Layer-Structured Li2MnIII0.2MnIV0.8O2.9 Thin Film Chemically Fabricated for Cathodic Active Material

open access: yesEnergies, 2020
Dilithium manganese oxide (LMO) thin film was newly fabricated as an active material on a fluorinated-tin-oxide pre-coated glass electrode by a wet process.
Yutaka Suwazono   +2 more
doaj   +1 more source

VDOO: A Short, Fast, Post-Quantum Multivariate Digital Signature Scheme

open access: yes, 2023
Hard lattice problems are predominant in constructing post-quantum cryptosystems. However, we need to continue developing post-quantum cryptosystems based on other quantum hard problems to prevent a complete collapse of post-quantum cryptography due to a
Ganguly, Anindya   +2 more
core  

Vectorized Implementation of Kyber and Dilithium on 32-bit Cortex-A Series

open access: yesIEEE Access
In the field of Post-Quantum Cryptography (PQC), which typically demands more memory and relatively lower performance compared to Elliptic-Curve Cryptography (ECC), recent studies have been actively focused on neon-based parallel implementations for the ...
Youngbeom Kim   +2 more
doaj   +1 more source

DiLizium 2.0: Revisiting Two-Party Crystals-Dilithium [PDF]

open access: yes, 2023
In previous years there has been an increased interest in designing threshold signature schemes. Most of the recent works focus on constructing threshold versions of ECDSA or Schnorr signature schemes due to their appealing usage in blockchain ...
Jelizaveta Vakarjuk   +2 more
core  

Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be rendered insecure by Shor’s algorithm when large-scale quantum computers are built.
Utsav Banerjee   +2 more
doaj   +1 more source

Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature

open access: yesApplied Sciences
In the face of advancing quantum computing capabilities posing significant threats to current cryptographic protocols, the need for post-quantum cryptography has become increasingly urgent.
Filip Opiłka   +3 more
doaj   +1 more source

Synthesis and crystal structure of 1,3-di-tert-butyl-2-chloro-4,4-diphenyl-1,3,2λ3,4-diazaphosphasiletidine

open access: yesActa Crystallographica Section E: Crystallographic Communications, 2019
The chemical reaction of dilithium N,N′-di(tbutyl)-Si,Si-diphenylsilanediamide and PCl3 yielded an off-white solid. Sublimation of the crude product under reduced pressure at elevated temperature gave colourless prismatic crystals of the title compound ...
Dennis Mo, Walter Frank
doaj   +1 more source

Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium [PDF]

open access: yes, 2023
We present a set of physical attacks against CRYSTALS-Dilithium that accumulate noisy knowledge on secret keys over multiple signatures, finally leading to a full recovery attack. The methodology is composed of two steps.
Joost Renes   +4 more
core  

Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process

open access: yesTechnologies
As quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC).
Kanza Cherkaoui Dekkaki   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy