Results 81 to 90 of about 211,169 (330)
This paper presents a set of efficient and parameterized hardware accelerators that target post-quantum lattice-based cryptographic schemes, including a versatile cSHAKE core, a binary-search CDT-based Gaussian sampler, and a pipelined NTT-based ...
Wen Wang+5 more
semanticscholar +1 more source
Lattice Based Tools in Cryptanalysis for Public Key Cryptography
Lattice reduction is a powerful concept for solving diverse problems involving point lattices. Lattice reduction has been successfully utilizing in Number Theory, Linear algebra and Cryptology. Not only the existence of lattice based cryptosystems of hard in nature, but also has vulnerabilities by lattice reduction techniques.
S. Pallam+2 more
openaire +3 more sources
This work reveals the phase composition and quantitative morphology analysis of precipitation‐hardened Fe32Cu12Ni11Ti16Al29 complex‐concentrated alloy. The precipitates are shown to have a high coherency. Morphology transition between sphere, cuboidal, and elongated morphology is observed. Finally, the overaging behavior is captured using microhardness.
Rostyslav Nizinkovskyi+4 more
wiley +1 more source
A Review of Sieve Algorithms in Solving the Shortest Lattice Vector Problem
As a category of algorithms to solve the shortest lattice vector problem, sieve algorithms have drawn more and more attention due to the prominent performance in recent years.
Zedong Sun, Chunxiang Gu, Yonghui Zheng
doaj +1 more source
In this study, the interplay of dipolar dynamics and ionic charge transport in MOF compounds is investigated. Synthesizing the novel structure CFA‐25 with integrated freely rotating dipolar groups, local and macroscopic effects, including interactions with Cs cations are explored.
Ralph Freund+6 more
wiley +1 more source
Time‐Controlled Dual Targeting to Program Systemic and Intercellular Transfer of Therapeutic Effects
Aspirin‐liposomes loaded onto monocytes enable inflammation‐triggered targeting and efficient hand‐over of aspirin to inflamed cells. Monocytes uptake a significant portion of aspirin‐liposomes, prolonging therapeutic action. This approach enhances anti‐inflammatory effects through intercellular transfer, demonstrating a translational strategy for ...
Seung Eun Yu+6 more
wiley +1 more source
Isogeny-based post-quantum key exchange protocols [PDF]
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core
Self‐aligned gate transistors are developed with a single‐step dielectric passivation and fine‐tuning of source/drain electrode work function using phosphonic acid self‐assembled monolayers (SAM). This transistor architecture minimizes overlap capacitances and access resistance.
Linqu Luo+16 more
wiley +1 more source
LACT+: Practical Post-Quantum Scalable Confidential Transactions
A “confidential monetary value” carries information about the real monetary value but does not disclose it. Post-quantum private blockchains with confidential monetary values—large-sized blockchains with large verification times—have the least ...
Jayamine Alupotha+2 more
doaj +1 more source
A materials and device design concept that comprises a self‐assembled ultra‐thin epitaxial ion‐transporting layer, an amorphous oxide overcoat oxygen‐blocking layer, and a partial filament formed during an electroforming step is proposed for low‐current multilevel resistive switching devices.
Ming Xiao+17 more
wiley +1 more source