Results 91 to 100 of about 211,169 (330)

A Survey on Homomorphic Encryption Schemes: Theory and Implementation

open access: yes, 2017
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas   +3 more
core   +1 more source

Enhanced Performance and Durability of Zinc–Air Batteries Utilizing W‐Doped Cobalt Pentlandite Catalysts

open access: yesAdvanced Functional Materials, EarlyView.
A W‐doped cobalt pentlandite electrocatalyst with sulfur vacancies is synthesized, guided by DFT calculations, which modifies the d‐band center, promoting oxygen intermediate desorption and lowering the *O generation energy barrier, thus enhancing catalytic activity.
Ning Liu   +8 more
wiley   +1 more source

PiouCrypt: Decentralized lattice-based method for visual symmetric cryptography

open access: yesFranklin Open, 2023
In recent years, establishing secure visual communications has turned into one of the essential problems for security engineers and researchers. However, only limited novel solutions are provided for image encryption, and limiting visual cryptography to ...
Navid Abapour, Mohsen Ebadpour
doaj  

A Spatiotemporal-chaos-based Encryption Having Overall Properties Considerably Better Than Advanced Encryption Standard

open access: yes, 2003
Spatiotemporal chaos of a two-dimensional one-way coupled map lattice is used for chaotic cryptography. The chaotic outputs of many space units are used for encryption simultaneously.
Hu, Gang   +6 more
core   +2 more sources

Print‐and‐Plate Architected Electrodes for Electrochemical Transformations Under Flow

open access: yesAdvanced Functional Materials, EarlyView.
Typical flow cell electrodes are composed of stochastic porous carbon, limiting understanding of electrode structure‐performance relationships. This work describes an approach, termed “print‐and‐plate,” to prepare porous electrodes by direct ink writing followed by conformal metal coating.
Dylan M. Barber   +12 more
wiley   +1 more source

Off‐Stoichiometry Engineering of the Electrical and Optical Properties of SrNbO3 Using Oxide Molecular Beam Epitaxy

open access: yesAdvanced Functional Materials, EarlyView.
The plasma edge of transparent conducting oxide SrNbO3 shifts from ∼2 eV in the visible range to 1.37 eV in the near‐infrared region by off‐stoichiometry using the vacancy sites as quasi‐substitutional virtual elements. This work advances the stoichiometry engineering of perovskite oxides using oxide molecular beam epitaxy, allowing synthesis beyond ...
Jasnamol Palakkal   +11 more
wiley   +1 more source

Exploring the fusion of lattice‐based quantum key distribution for secure Internet of Things communications

open access: yesIET Quantum Communication
The integration of lattice‐based cryptography principles with Quantum Key Distribution (QKD) protocols is explored to enhance security in the context of Internet of Things (IoT) ecosystems.
Sujit Biswas   +4 more
doaj   +1 more source

Coding techniques in lattice-based cryptography

open access: yes, 2020
Cryptographic constructions based on hard lattice problems have emerged as a front runner for the standardization of post quantum public key cryptography. The work done in this thesis introduces source and channel coding techniques to optimize specific parts of lattice-based cryptographic schemes from an information theoretic standpoint, with a ...
openaire   +3 more sources

Toward Architected Microstructures Using Advanced Laser Beam Shaping in Laser Powder Bed Fusion of Ti‐6Al‐4V

open access: yesAdvanced Functional Materials, EarlyView.
This research applies advanced laser beam shaping (LCoS‐SLM) to fabricate the Ti‐6Al‐4V alloy via laser powder bed fusion. A tailored beam is used to prevent martensite formation and create a dual α+β microstructure by controlling cooling rates.
Reza Esmaeilzadeh   +8 more
wiley   +1 more source

High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
In this paper, we present an instruction set coprocessor architecture for lattice-based cryptography and implement the module lattice-based post-quantum key encapsulation mechanism (KEM) Saber as a case study.
Sujoy Sinha Roy, Andrea Basso
doaj   +1 more source

Home - About - Disclaimer - Privacy