Results 61 to 70 of about 309,416 (282)

Sieve algorithms for the shortest vector problem are practical

open access: yesJournal of Mathematical Cryptology, 2008
The most famous lattice problem is the Shortest Vector Problem (SVP), which has many applications in cryptology. The best approximation algorithms known for SVP in high dimension rely on a subroutine for exact SVP in low dimension.
Nguyen Phong Q., Vidick Thomas
doaj   +1 more source

Coherent Networks of Si Nanocrystals: Tunable Collective Resonances with Narrow Spectral Widths

open access: yesAdvanced Photonics Research, 2021
The ultralong coherent networks of Si nanocrystals (NCs) via lattice‐enhanced dipole–dipole coupling and the formation of disordered arrays of phase‐correlated field hotspots are studied.
Seyed M. Sadeghi, Rithvik R. Gutha
doaj   +1 more source

Free vector lattices over vector spaces

open access: yes, 2020
We show that free vector lattices over vector spaces can be realised in a natural fashion as vector lattices of real-valued functions. The argument is inspired by earlier work by Bleier, with some analysis in locally convex topological vector spaces ...
de Jeu, Marcel
core  

Investigation of Laser Ablation and Brush Pre‐Treatments for AlCu Cold Roll Bonding in Oxygen‐Free Conditions

open access: yesAdvanced Engineering Materials, EarlyView.
It is shown that laser ablation pretreatment under oxygen‐free conditions enables copper–aluminium bonding at significantly lower deformation degrees and improved properties compared to mechanical brushing. Laser ablation further increases interface contact area and induces favourable residual stress states and microstructural compatibility ...
Khemais Barienti   +11 more
wiley   +1 more source

Design and Mechanical Testing of 3D Printed Hierarchical Lattices Using Biocompatible Stereolithography

open access: yesDesigns, 2020
Emerging 3D printing technologies are enabling the rapid fabrication of complex designs with favorable properties such as mechanically efficient lattices for biomedical applications.
Md Moniruzzaman   +3 more
doaj   +1 more source

Microstructural Evolution and Vacancy Defect Formation in Mn–Mo–Ni RPV Steel Under Low Cycle Fatigue: Insights From EBSD and PALS

open access: yesAdvanced Engineering Materials, EarlyView.
Low‐cycle fatigue damage in Mn–Mo–Ni reactor pressure vessel steel is examined using a combined electron backscatter diffraction and positron annihilation lifetime spectroscopy approach. The study correlates texture evolution, dislocation substructure development, and vacancy‐type defect formation across uniform, necked, and fracture regions, providing
Apu Sarkar   +2 more
wiley   +1 more source

On Alexandrov lattices

open access: yesInternational Journal of Mathematics and Mathematical Sciences, 1993
By an Alexandrov lattice we mean a δ normal lattice of subsets of an abstract set X, such that the set of ℒ-regular countably additive bounded measures is sequentially closed in the set of ℒ-regular finitely additive bounded measures on the algebra ...
Albert Gorelishvili
doaj   +1 more source

An Attack Bound for Small Multiplicative Inverse of φ(N) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques

open access: yesCryptography, 2018
In this paper, we gave an attack on RSA (Rivest⁻Shamir⁻Adleman) Cryptosystem when φ ( N ) has small multiplicative inverse modulo e and the prime sum p + q is of the form p + q = 2 n k 0 + k 1 , where n is a ...
Pratha Anuradha Kameswari   +1 more
doaj   +1 more source

Characterization of Nitinol Produced by Laser Powder Bed Fusion for Mechanical Metamaterial Applications

open access: yesAdvanced Engineering Materials, EarlyView.
Stabilization of L‐PBF Ni50.7Ti49.3 under low‐cycle loading was investigated. Recoverable strain after cycling was dependent on the amount of applied load. Recovery ratio was 53.4% and 35.1% at intermediate and high load, respectively. The maximum total strain reached 10.3% at a high load of 1200 MPa.
Ondřej Červinek   +5 more
wiley   +1 more source

On the independence heuristic in the dual attack

open access: yesJournal of Mathematical Cryptology
Post-quantum cryptography deals with the development and analysis of cryptographic schemes that are assumed to be secure even against attackers with access to a powerful quantum computer.
Bashiri Kaveh, Wiemers Andreas
doaj   +1 more source

Home - About - Disclaimer - Privacy