Results 61 to 70 of about 2,451 (171)
Ultrabroadband Spacetime Nanoscopy of Terahertz Polaritons in a van der Waals Cavity
This work introduces SYnchrotron SpaceTimE Mapping (SYSTEM), which captures real‐time evolution of polariton wave packets with ∼10 nm spatial and sub‐100 fs temporal resolution across an ultrabroadband 5 to 50 THz range. Here, SYSTEM directly visualizes the creation, interference, and decay of multiple high‐quality Fabry‐Pérot phonon polariton cavity ...
Lukas Wehmeier +17 more
wiley +1 more source
UPP-NTT: A Unified Parallel Pipelined NTT Accelerator for CRYSTALS-Kyber Post-Quantum Cryptography
In lattice-based post-quantum cryptographic schemes, the Number Theoretic Transform (NTT) is a core computational operation that enables efficient polynomial multiplication in algorithms such as CRYSTALS-Kyber.
P. Ramyavani +5 more
doaj +1 more source
A multidimensional PANI: PSS/Fe‐BTC/carbon cloth hybrid electrode is constructed that integrates a 2D MOF framework with a conducting polymer network on a flexible current collector. The hierarchical architecture establishes strongly coupled redox active sites and continuous ion and electron pathways, enabling fast, durable charge storage and ...
Minseong Ju +9 more
wiley +1 more source
In this study, anionic substitution with A = F−, Cl−, and Br− of Na0.66Fe1/3Mn2/3O2−xAx (with x < 0.2), which is used as a cathode material in sodium‐ion batteries, was investigated. It was found that 0.02 mol F can be incorporated into NFMO without the formation of secondary phases.
Anna Domgans +12 more
wiley +1 more source
A Flexible and Parallel Hardware Accelerator for Forward and Inverse Number Theoretic Transform
This paper demonstrates an efficient and flexible hardware accelerator for polynomial multiplication using number theoretic transform (NTT). The proposed architecture considers flexibility and performance requirements at the same time.
Muhammad Rashid +3 more
doaj +1 more source
Decoy state quantum key distribution with two-way classical post-processing [PDF]
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution protocols when a coherent state source is used.
C. H. Bennett +14 more
core +1 more source
We propose a secure computation solution for blockchain networks. The correctness of computation is verifiable even under malicious majority condition using information-theoretic Message Authentication Code (MAC), and the privacy is preserved using ...
Chen, Jiang +3 more
core +1 more source
Turbo Packet Combining for Broadband Space-Time BICM Hybrid-ARQ Systems with Co-Channel Interference
In this paper, efficient turbo packet combining for single carrier (SC) broadband multiple-input--multiple-output (MIMO) hybrid--automatic repeat request (ARQ) transmission with unknown co-channel interference (CCI) is studied. We propose a new frequency
Ait-Idir, Tarik +2 more
core +3 more sources
Irrational Conformal Field Theory [PDF]
This is a review of irrational conformal field theory, which includes rational conformal field theory as a small subspace. Central topics of the review include the Virasoro master equation, its solutions and the dynamics of irrational conformal field ...
Ademollo +178 more
core +2 more sources
SCE-NTT: A Hardware Accelerator for Number Theoretic Transform Using Superconductor Electronics
13 pages, 22 ...
Razmkhah, Sasan +15 more
openaire +2 more sources

