Results 101 to 110 of about 92,548 (300)
A 334$μ$W 0.158mm$^2$ ASIC for Post-Quantum Key-Encapsulation Mechanism Saber with Low-latency Striding Toom-Cook Multiplication Authors Version [PDF]
Archisman Ghosh +6 more
openalex +1 more source
Conventional unstable electron transport layers (ETLs) limit self‐powered organic sensors. This work resolves this by developing a n‐type self‐assembled monolayer (SAM), “3‐PAPh”. This SAM forms a chemically stable and structurally ordered interface that fundamentally suppresses defect formation.
Ohhyun Kwon +11 more
wiley +1 more source
Syrga2: Post-Quantum Hash-Based Signature Scheme
This paper proposes a new post-quantum signature scheme, Syrga2, based on hash functions. As known, existing post-quantum algorithms are classified based on their structures.
Kunbolat Algazy +3 more
doaj +1 more source
Fe and P co‐doped Co9S8 nanocorals (Fe, P‐Co9S8) are successfully synthesized by a heteroatom engineering strategy, which exhibit outstanding bifunctional electrocatalytic performance for both the hydrogen evolution reaction (HER) and hydrazine oxidation reaction (HzOR).
Yuying Meng +8 more
wiley +1 more source
Quantum vs post‐quantum security for future networks: Survey
Classical cryptography (crypt) schemes (sche) have been compromised by the practical results on quantum (q) computers in recent years. Nowadays these sche ‘s can be compromised by using the Shor's methodology. This paper provides a detailed survey of the
Savo Glisic
doaj +1 more source
Scalable Thermal Engineering via Femtosecond Laser‐Direct‐Written Phononic Nanostructures
This study demonstrates that femtosecond laser‐induced periodic surface structures (fs‐LIPSS) can function as phononic metasurfaces, reducing thermal conductivity below the plain thin‐film limit. Phonon Monte Carlo analysis reveals that the periodic structures restrict phonon mean free paths.
Hiroki Hamma +4 more
wiley +1 more source
Post-Quantum Delegated Proof of Luck for Blockchain Consensus Algorithm
The advancements in quantum computing and the potential for polynomial-time solutions to traditional public key cryptography (i.e., Rivest–Shamir–Adleman (RSA) and elliptic-curve cryptography (ECC)) using Shor’s algorithm pose a serious threat to the ...
Hyunjun Kim +4 more
doaj +1 more source
Fluoroalkyl‐functionalized tin–oxo nanoclusters (N‐TOC6) enable robust pattern formation through ligand crosslinking under EUV exposure without thermal processing. Sn–F coordination mitigates the Lewis acidity of Sn centers, suppressing reactions with airborne molecules and improving post‐exposure pattern stability.
Yejin Ku +18 more
wiley +1 more source
Status report on the third round of the NIST post-quantum cryptography standardization process
M.V. Yesina +2 more
openalex +2 more sources

