Results 61 to 70 of about 16,532 (241)
Synchrotron Radiation for Quantum Technology
Materials and interfaces underpin quantum technologies, with synchrotron and FEL methods key to understanding and optimizing them. Advances span superconducting and semiconducting qubits, 2D materials, and topological systems, where strain, defects, and interfaces govern performance.
Oliver Rader +10 more
wiley +1 more source
Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values [PDF]
Two-party secure function evaluation (SFE) has become significantly more feasible, even on resource-constrained devices, because of advances in server-aided computation systems.
Butler, Kevin +3 more
core
Bio‐based and (semi‐)synthetic zwitterion‐modified novel materials and fully synthetic next‐generation alternatives show the importance of material design for different biomedical applications. The zwitterionic character affects the physiochemical behavior of the material and deepens the understanding of chemical interaction mechanisms within the ...
Theresa M. Lutz +3 more
wiley +1 more source
Error Amplification in Code-based Cryptography
Code-based cryptography is one of the main techniques enabling cryptographic primitives in a post-quantum scenario. In particular, the MDPC scheme is a basic scheme from which many other schemes have been derived. These schemes rely on iterative decoding
Alexander Nilsson +2 more
doaj +1 more source
Peptide Sequencing With Single Acid Resolution Using a Sub‐Nanometer Diameter Pore
To sequence a single molecule of Aβ1−42–sodium dodecyl sulfate (SDS), the aggregate is forced through a sub‐nanopore 0.4 nm in diameter spanning a 4.0 nm thick membrane. The figure is a visual molecular dynamics (VMD) snapshot depicting the translocation of Aβ1−42–SDS through the pore; only the peptide, the SDS, the Na+ (yellow/green) and Cl− (cyan ...
Apurba Paul +8 more
wiley +1 more source
As UWSN have received attention, a need for an efficient and secure communication protocol has arisen to overcome the low device performance, node failure, and high propagation latency.
Donghyun Yu, Sinwoong Yun, Jemin Lee
doaj +1 more source
SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS [PDF]
The number of security attacks against network is increasing dramatically with time. To protect the model against these attacks; techniques like passwords, cryptography, and biometrics are used.
M. L. SINGH, AJAY KAKKAR, P. K. BANSAL
doaj
A Non-commutative Cryptosystem Based on Quaternion Algebras
We propose BQTRU, a non-commutative NTRU-like cryptosystem over quaternion algebras. This cryptosystem uses bivariate polynomials as the underling ring.
Bagheri, Khadijeh +2 more
core +1 more source
Decryption Failure Attacks on Post-Quantum Cryptography
This dissertation discusses mainly new cryptanalytical results related to issues of securely implementing the next generation of asymmetric cryptography, or Public-Key Cryptography (PKC).PKC, as it has been deployed until today, depends heavily on the integer factorization and the discrete logarithm problems.Unfortunately, it has been well-known since ...
openaire +1 more source
Integrative Approaches for DNA Sequence‐Controlled Functional Materials
DNA is emerging as a programmable building block for functional materials with applications in biomimicry, biochemical, and mechanical information processing. The integration of simulations, experiments, and machine learning is explored as a means to bridge DNA sequences with macroscopic material properties, highlighting current advances and providing ...
Aaron Gadzekpo +4 more
wiley +1 more source

