Results 41 to 50 of about 2,144,321 (256)
Abstract A class of adamantane‐like molecular materials attracts attention because they exhibit an extreme non‐linear optical response and emit a broad white‐light spectrum after illumination with a continuous‐wave infrared laser source. According to recent studies, not only the nature of the cluster molecules, but also the macroscopic structure of the
Sebastian Schwan+7 more
wiley +1 more source
Abstract Considering the space‐time adaptive method for parabolic evolution equations we introduced in Stevenson et al., this work discusses an implementation of the method in which every step is of linear complexity. Exploiting the tensor‐product structure of the space‐time cylinder, the method allows for a family of trial spaces given as spans of ...
Raymond van Venetië, Jan Westerdiep
wiley +1 more source
Electron contact interlayers for low‐temperature‐processed crystalline silicon solar cells
In this study, a series of interlayers are trialed as electron‐selective contacts on crystalline silicon, including several materials that were previously untested in this application. Most of these interlayers were found to achieve mΩcm2‐scale specific contact resistivities.
Jesus Ibarra Michel+11 more
wiley +1 more source
The most efficient indifferentiable hashing to elliptic curves of j-invariant 1728
This article makes an important contribution to solving the long-standing problem of whether all elliptic curves can be equipped with a hash function (indifferentiable from a random oracle) whose running time amounts to one exponentiation in the basic ...
Koshelev Dmitrii
doaj +1 more source
Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack
The 51% attack is a technique which intends to fork a blockchain in order to conduct double-spending. Adversaries controlling more than half of the total hashing power of a network can perform this attack.
Sarwar Sayeed, Hector Marco-Gisbert
doaj +1 more source
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan+7 more
wiley +1 more source
Fast and Powerful Hashing using Tabulation [PDF]
Randomized algorithms are often enjoyed for their simplicity, but the hash functions employed to yield the desired probabilistic guarantees are often too complicated to be practical.
Thorup, Mikkel
core +3 more sources
BackgroundOver the past decade, the emergence of several large federated clinical data networks has enabled researchers to access data on millions of patients at dozens of health care organizations.
Yu, Yun William, Weber, Griffin M
doaj +1 more source
The Stability and the Security of the Tangle [PDF]
In this paper we study the stability and the security of the distributed data structure at the base of the IOTA protocol, called the Tangle. The contribution of this paper is twofold.
Bramas, Quentin
core +2 more sources
T‐depth reduction method for efficient SHA‐256 quantum circuit construction
Abstract To perform a quantum brute force attack on a cryptosystem based on Grover's algorithm, it is necessary to implement a quantum circuit of the cryptographic algorithm. Therefore, an efficient quantum circuit design of a given cryptographic algorithm is essential, especially in terms of quantum security analysis, and it is well known that T‐depth
Jongheon Lee+3 more
wiley +1 more source