Results 51 to 60 of about 3,908 (312)

A Thermodynamic 3D Model for the Simulation of Diffusion‐Controlled Alloying Processes in Heterogeneous Material Structures

open access: yesAdvanced Engineering Materials, EarlyView.
A numerical model resulting from irreversible thermodynamics for describing transport processes is introduced, focusing on thermodynamic activity gradients as the actual driving force for diffusion. Implemented in CUDA C++ and using CalPhaD methods for determining the necessary activity data, the model accurately simulates interdiffusion in aluminum ...
Ulrich Holländer   +3 more
wiley   +1 more source

On a class of strongly asymmetric PKA algorithms

open access: yesJournal of Mathematical Cryptology, 2015
In the papers [New features for public key exchange algorithms, in: 18-th International ICWG Meeting (Krakow 2011)], [Strongly asymmetric PKD cryptographic algorithms: An implementation using the matrix model, in: Proceedings ISEC Conference (Shizuoka ...
Accardi Luigi, Regoli Massimo
doaj   +1 more source

Amino acid composition of the proteins from chylomicrons and human serum lipoproteins

open access: yesJournal of Lipid Research, 1967
By a combination of polyanion precipitation and ultracentrifugation, chylomicrons, very low density, low density, and high density lipoproteins have been isolated from human serum as discrete classes free from contamination with any other major class of ...
Robert S. Levy   +3 more
doaj   +1 more source

Electrical Conductivities of Conductors, Semiconductors, and Their Mixtures at Elevated Temperatures

open access: yesAdvanced Engineering Materials, EarlyView.
This article presents a comprehensive review of temperature‐dependent electrical conductivity data for multiple material classes at elevated temperatures, highlighting a persistent conductivity gap between metals and semiconductors in the range of 102$\left(10\right)^{2}$– 107$\left(10\right)^{7}$ S/m. Metal–ceramic irregular metamaterials are proposed
Valentina Torres Nieto, Marcia A. Cooper
wiley   +1 more source

Unconditional correctness of recent quantum algorithms for factoring and computing discrete logarithms

open access: yesForum of Mathematics, Pi
In 1994, Shor introduced his famous quantum algorithm to factor integers and compute discrete logarithms in polynomial time. In 2023, Regev proposed a multidimensional version of Shor’s algorithm that requires far fewer quantum gates.
Cédric Pilatte
doaj   +1 more source

Forward-Secure Linkable Ring Signatures from Bilinear Maps

open access: yesCryptography, 2018
We present the first linkable ring signature scheme with both unconditional anonymity and forward-secure key update: a powerful tool which has direct applications in elegantly addressing a number of simultaneous constraints in remote electronic voting ...
Xavier Boyen, Thomas Haines
doaj   +1 more source

Discrete Logarithm Factory

open access: yesIACR Communications in Cryptology
The Number Field Sieve and its variants are the best algorithms to solve the discrete logarithm problem in finite fields (except for the weak small characteristic case). The Factory variant accelerates the computation when several prime fields are targeted.
Haetham Al Aswad   +2 more
openaire   +2 more sources

Spectrally Tunable 2D Material‐Based Infrared Photodetectors for Intelligent Optoelectronics

open access: yesAdvanced Functional Materials, EarlyView.
Intelligent optoelectronics through spectral engineering of 2D material‐based infrared photodetectors. Abstract The evolution of intelligent optoelectronic systems is driven by artificial intelligence (AI). However, their practical realization hinges on the ability to dynamically capture and process optical signals across a broad infrared (IR) spectrum.
Junheon Ha   +18 more
wiley   +1 more source

Fast Signature Scheme for Network Coding

open access: yesJournal of Algorithms & Computational Technology, 2012
It has been proven that network coding can provide significant benefits to networks, but such systems are very vulnerable to pollution attacks. In recent years, many schemes have been designed to prevent these attacks.
Mingxi Yang, Wenjie Yan, Huajing Fang
doaj   +1 more source

Unconditionally Secure Quantum Signatures

open access: yesEntropy, 2015
Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered
Ryan Amiri, Erika Andersson
doaj   +1 more source

Home - About - Disclaimer - Privacy