Results 21 to 30 of about 7,503 (231)

In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium

open access: yesCybersecurity
During the standardisation process of post-quantum cryptography, NIST encourages research on side-channel analysis for candidate schemes. As the recommended lattice signature scheme, CRYSTALS-Dilithium, when implemented on hardware, has seen limited ...
Huaxin Wang   +4 more
doaj   +2 more sources

Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
With the standardization of NIST post-quantum cryptographic (PQC) schemes, optimizing these PQC schemes across various platforms presents significant research value. While most existing software implementation efforts have concentrated on ARM platforms,
Jipeng Zhang   +3 more
doaj   +2 more sources

Inversion of the X-ray restrained wavefunction equations: a first step towards the development of exchange-correlation functionals based on X-ray data. [PDF]

open access: yesJ Appl Crystallogr
The X‐ray restrained wavefunction (XRW) approach could be a useful tool to propose new exchange–correlation (xc) functionals for density functional theory. Here, orbital‐averaged XRW perturbation potentials of atoms (neon, argon and krypton) and simple molecules (dilithium and urea) are extracted and visualized for the first time, and their possible ...
Genoni A, Sironi M.
europepmc   +2 more sources

Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results

open access: yesIACR Cryptology ePrint Archive, 2023
In this work, we present a systematic study of Side-Channel Attacks (SCA) and Fault Injection Attacks (FIA) on structured lattice-based schemes, with main focus on Kyber Key Encapsulation Mechanism (KEM) and Dilithium signature scheme, which are leading ...
P. Ravi   +3 more
semanticscholar   +1 more source

Improving Bitcoin’s Post-Quantum Transaction Efficiency With a Novel Lattice-Based Aggregate Signature Scheme Based on CRYSTALS-Dilithium and a STARK Protocol

open access: yesIEEE Access, 2022
This paper proposes a novel lattice-based aggregate signature (LAS) scheme that brings post-quantum security to the Bitcoin system without sacrificing its transaction efficiency. Bitcoin currently employs Elliptic Curve Digital Signature Algorithm (ECDSA)
Yunjia Quan
doaj   +1 more source

High-capacity dilithium hydroquinone cathode material for lithium-ion batteries. [PDF]

open access: yesNatl Sci Rev
Lithiated organic cathode materials show great promise for practical applications in lithium-ion batteries owing to their Li-reservoir characteristics.
Lu Y   +9 more
europepmc   +2 more sources

Polybutadiene Cross-Linked With Various Diols – Effect On Thermal Stability [PDF]

open access: yes, 2000
The relationship between cross-linking and thermal stability as related to polybutadiene is the focus of current research. Cross-linked polybutadienes have been prepared using various diols as the cross-linking agent.
McKinney, Michael A.   +2 more
core   +2 more sources

Quantum attacks on Bitcoin, and how to protect against them [PDF]

open access: yes, 2017
The key cryptographic protocols used to secure the internet and financial transactions of today are all susceptible to attack by the development of a sufficiently large quantum computer.
Aggarwal, Divesh   +4 more
core   +3 more sources

Magnetically Induced Currents in [n]Cycloparaphenylenes, n=6-11 [PDF]

open access: yes, 2010
Peer ...
Pichierri, Fabio   +2 more
core   +1 more source

Alkali metal derivatives of an ortho-phenylene diamine [PDF]

open access: yes, 2013
Treatment of the ortho-phenylene diamine C6H4-1,2-{N(H)Tripp}2 (1, PDAH2, Tripp = 2,4,6-triisopropylphenyl) with two equivalents of MR (M = Li, R = Bun; M = Na or K, R = CH2C6H5) afforded the dimetallated alkali metal ortho-phenylene diamide dianion ...
Alexander J. Blake   +56 more
core   +3 more sources

Home - About - Disclaimer - Privacy