Results 121 to 130 of about 131,074 (313)
Kyber, Saber, and SK‐MLWR Lattice‐Based Key Encapsulation Mechanisms Model Checking with Maude [PDF]
Duong Dinh Tran +4 more
openalex +1 more source
Low‐Symmetry Weyl Semimetals: A Path to Ideal Topological States
This study presents a theoretical framework for realizing ideal Weyl semimetals, where Weyl nodes are well‐isolated at the Fermi level. The approach is exemplified in the low‐symmetry material Cu2SnSe3, which exhibits tunable topological phases, current‐induced orbital magnetization, and a strong circular photogalvanic effect, making it a promising ...
Darius‐Alexandru Deaconu +3 more
wiley +1 more source
For the first time, a highly sensitive electrochemical biosensor based on SiO2‐based hairy particles with a grafted PDMAEMA polymer brush containing a quantifiable and large amount of immobilized Laccase is reported. The fabricated biosensor exhibits a sensitivity of 0.14 A·m⁻¹, a limit of detection (LOD) of 0.1 µm, and a detection range of 0.3–750 µm,
Pavel Milkin +7 more
wiley +1 more source
SoK: Evolution of the Key Encapsulation Mechanism’s Role in Cryptographic Migrations for IoT Systems
Key Encapsulation Mechanisms (KEM) is a special case of Public Key Encryption (PKE) that was recently standardized by National Institute of Standards and Technology in USA.
Silonosov Alexandr +2 more
doaj +1 more source
Security analysis of promising key encapsulation mechanisms in the core-SVP model
Sergey Kandiy
openalex +2 more sources
The dielectric properties of clays are studied on the level of individual monolayers and functional double stacks. The material breakdown characteristics and charge storage performance are analyzed. For illustration, a defined charge pattern representing a cuneiform character is produced, written into a microscopic clay tile, referencing the origins of
Sebastian Gödrich +6 more
wiley +1 more source
Scabbard: An Exploratory Study on Hardware Aware Design Choices of Learning with Rounding-based Key Encapsulation Mechanisms [PDF]
Suparna Kundu +5 more
openalex +3 more sources
The existing mainstream post-quantum key encapsulation mechanisms, such as the module-lattice-based key encapsulation mechanism (ML-KEM), rely on the module learning with errors (Module-LWE) problem associated with structured lattices.
PAN Jie +7 more
doaj
Transparent authentication methodology in electronic education
In the context of on-line assessment in e-learning, a problem arises when a student taking an exam may wish to cheat by handing over personal credentials to someone else to take their place in an exam, Another problem is that there is no method for ...
Argles, David +3 more
core

