Results 81 to 90 of about 5,472 (205)

CRYPHTOR: A Memory-Unified NTT-Based Hardware Accelerator for Post-Quantum CRYSTALS Algorithms

open access: yesIEEE Access
This paper presents the design and FPGA implementation of a hardware accelerator for the Post-Quantum CRYSTALS-Kyber and CRYSTALS-Dilithium algorithms, named CRYPHTOR (CRYstals Polynomial HW acceleraTOR).
Stefano Di Matteo   +2 more
doaj   +1 more source

The monopotassium salt of the ligand of a Ziegler–Natta catalyst [PDF]

open access: yes, 1993
The anion of dipotassium (tert-butylamino)-dimethyl(tetramethylcyclopentadienyl)silanediide can coordinate to transition metals to form precursors for single-component Ziegler-Natta polymerization catalysts.
Bercaw, John E.   +2 more
core   +1 more source

Efficient implementation of post-quantum digital signatures on Raspberry Pi

open access: yesDiscover Applied Sciences
While quantum computing poses a threat to many classical cryptographic schemes such as RSA and ECC, the quest for quantum-resistant alternatives has seen rapid growth.
Mahmood A. Al-Shareeda   +4 more
doaj   +1 more source

Security and Performance Analyses of Post-Quantum Digital Signature Algorithms and Their TLS and PKI Integrations

open access: yesCryptography
Quantum computing challenges the mathematical problems anchoring the security of the classical public key algorithms. For quantum-resistant public key algorithms, the National Institute of Standards and Technology (NIST) has undergone a multi-year ...
Manohar Raavi   +5 more
doaj   +1 more source

Coupling and Dissociation in Artificial Molecules

open access: yes, 2001
We show that the spin-and-space unrestricted Hartree-Fock method, in conjunction with the companion step of the restoration of spin and space symmetries via Projection Techniques (when such symmetries are broken), is able to describe the full range of ...
Landman, Uzi, Yannouleas, Constantine
core   +2 more sources

In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium

open access: yesCybersecurity
During the standardisation process of post-quantum cryptography, NIST encourages research on side-channel analysis for candidate schemes. As the recommended lattice signature scheme, CRYSTALS-Dilithium, when implemented on hardware, has seen limited ...
Huaxin Wang   +4 more
doaj   +1 more source

Main group tellurium heterocycles anchored by a P2VN2 scaffold and their sulfur/selenium analogues [PDF]

open access: yes, 2015
The authors are grateful to the EPSRC, the EPSRC National Mass Spectrometry Service Centre (NMSSC) Swansea, the School of Chemistry St. Andrews, EaStCHEM, and NSERC Canada for financial support.A comprehensive investigation of reactions of alkali-metal ...
Athukorala Arachchige, K.S.   +6 more
core   +1 more source

Dilithium disodium nickel(II) cyclohexaphosphate dodecahydrate, Li2Na2NiP6O18·12H2O

open access: yesActa Crystallographica Section E, 2012
The crystal structure of Li2Na2NiP6O18·12H2O is characterized by the presence of six-membered P6O186− phosphate ring anions (internal symmetry -1) having a chair conformation and three different cations, viz.
Sonia Abid   +2 more
doaj   +1 more source

The Fifth International Competition on Knowledge Engineering for Planning and Scheduling: Summary and Trends [PDF]

open access: yes, 2017
We review the 2016 International Competition on Knowledge Engineering for Planning and Scheduling (ICKEPS), the fifth in a series of competitions started in 2005.
Chrpa, Lukáš   +3 more
core   +1 more source

A blockchain-based hybrid encryption technique with anti-quantum signature for securing electronic health records

open access: yesComplex & Intelligent Systems
Electronic health records (EHRs) are important for the efficient management of healthcare data. However, Healthcare data travels across an open route, i.e., the Internet, making EHR security a difficult process to do. This puts healthcare data vulnerable
Shtwai Alsubai   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy