Results 91 to 100 of about 211,169 (330)
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas+3 more
core +1 more source
A W‐doped cobalt pentlandite electrocatalyst with sulfur vacancies is synthesized, guided by DFT calculations, which modifies the d‐band center, promoting oxygen intermediate desorption and lowering the *O generation energy barrier, thus enhancing catalytic activity.
Ning Liu+8 more
wiley +1 more source
PiouCrypt: Decentralized lattice-based method for visual symmetric cryptography
In recent years, establishing secure visual communications has turned into one of the essential problems for security engineers and researchers. However, only limited novel solutions are provided for image encryption, and limiting visual cryptography to ...
Navid Abapour, Mohsen Ebadpour
doaj
Spatiotemporal chaos of a two-dimensional one-way coupled map lattice is used for chaotic cryptography. The chaotic outputs of many space units are used for encryption simultaneously.
Hu, Gang+6 more
core +2 more sources
Print‐and‐Plate Architected Electrodes for Electrochemical Transformations Under Flow
Typical flow cell electrodes are composed of stochastic porous carbon, limiting understanding of electrode structure‐performance relationships. This work describes an approach, termed “print‐and‐plate,” to prepare porous electrodes by direct ink writing followed by conformal metal coating.
Dylan M. Barber+12 more
wiley +1 more source
The plasma edge of transparent conducting oxide SrNbO3 shifts from ∼2 eV in the visible range to 1.37 eV in the near‐infrared region by off‐stoichiometry using the vacancy sites as quasi‐substitutional virtual elements. This work advances the stoichiometry engineering of perovskite oxides using oxide molecular beam epitaxy, allowing synthesis beyond ...
Jasnamol Palakkal+11 more
wiley +1 more source
The integration of lattice‐based cryptography principles with Quantum Key Distribution (QKD) protocols is explored to enhance security in the context of Internet of Things (IoT) ecosystems.
Sujit Biswas+4 more
doaj +1 more source
Coding techniques in lattice-based cryptography
Cryptographic constructions based on hard lattice problems have emerged as a front runner for the standardization of post quantum public key cryptography. The work done in this thesis introduces source and channel coding techniques to optimize specific parts of lattice-based cryptographic schemes from an information theoretic standpoint, with a ...
openaire +3 more sources
This research applies advanced laser beam shaping (LCoS‐SLM) to fabricate the Ti‐6Al‐4V alloy via laser powder bed fusion. A tailored beam is used to prevent martensite formation and create a dual α+β microstructure by controlling cooling rates.
Reza Esmaeilzadeh+8 more
wiley +1 more source
In this paper, we present an instruction set coprocessor architecture for lattice-based cryptography and implement the module lattice-based post-quantum key encapsulation mechanism (KEM) Saber as a case study.
Sujoy Sinha Roy, Andrea Basso
doaj +1 more source