Results 111 to 120 of about 92,548 (300)
A Comparative Study of Post-Quantum Cryptographic Algorithm Implementations for Secure and Efficient Energy Systems Monitoring [PDF]
Gandeva Bayu Satrya +2 more
openalex +1 more source
A Lightweight McEliece Cryptosystem Co-processor Design [PDF]
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms.
Agrawal, Rashmi +3 more
core
Permanent magnets derive their extraordinary strength from deep, universal electronic‐structure principles that control magnetization, anisotropy, and intrinsic performance. This work uncovers those governing rules, examines modern modeling and AI‐driven discovery methods, identifies critical bottlenecks, and reveals electronic fingerprints shared ...
Prashant Singh
wiley +1 more source
Frequency-multiplexed optical reservoir computing using a microcomb
Optical reservoir computing (ORC) promises fast, energy-efficient temporal inference by harnessing the rich transient dynamics of photonic systems. Yet most ORC demonstrations still depend on fiber delay lines or camera-based spatial multiplexing, which ...
Cuevas Jonathan +5 more
doaj +1 more source
This thesis consists of seventeen chapters. The first chapter is the introduction part which explains the emergence of the theory of post quantum calculus and its historical development.The second chapter includes some definitions, formulas and results belonging to quantum calculus.Some definitions, notations, formulas and results of the (p,q)-calculus
openaire +1 more source
Magnetic Force Microscopy Signatures of Higher‐Order Skyrmions and Antiskyrmions
Magnetic force microscopy operated under vacuum conditions enables the qualitative identification of higher‐order skyrmions and antiskyrmions in Co/Ni multilayers at room temperature. Distinct stray‐field contrast signatures arise from vertical Bloch lines and complex domain‐wall configurations.
Sabri Koraltan +8 more
wiley +1 more source
On the Impossibility of Post-Quantum Black-Box Zero-Knowledge in Constant Rounds [PDF]
Nai-Hui Chia +3 more
openalex +1 more source
Dicarboxylate‐modified anionic hairy cellulose nanocrystals exhibit a high selectivity for dysprosium(III) over neodymium(III). This selectivity arises from disordered dicarboxylate cellulose “hairs” that enable cooperative ionic coordination, hydrogen bonding, and strain‐induced conformational shrinkage.
Roya Koshani +6 more
wiley +1 more source
Impossibility of Three Pass Protocol using Public Abelian Groups
Key transport protocols are designed to transfer a secret key from an initiating principal to other entities in a network. The three-pass protocol is a key transport protocol developed by Adi Shamir in 1980 where Alice wants to transport a secret message
Kılıç, Adnan +2 more
core
Deterministic hBN Bubbles as a Versatile Platform for Studies on Single‐Photon Emitters
Single‐photon emitters (SPEs) in hBN are promising for quantum technologies; however, in exfoliated samples their activation is required, limiting reproducibility of previous studies. This work introduces a large‐area MOVPE‐grown hBN platform that hosts SPEs without prior activation.
Piotr Tatarczak +8 more
wiley +1 more source

