Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design [PDF]
Davide Bellizia+7 more
openalex +1 more source
Ultrafast pulsed laser technology enables precise material processing. This study examines molybdenum oxide formation under varying laser parameters. A dataset of 187 samples is generated, and eight deep neural networks (DNNs) with different architectures are trained. Models are validated using three learning rates and evaluated with mean squared error,
Jose R. Paredes‐Miguel+6 more
wiley +1 more source
The dangerous path towards your own cryptography method [PDF]
Would you like to have your own cryptography method? Experts say you should not do it. If you think you can develop a better cryptography method anyway. We present a brief discussion about some well known cryptography methods and how our model fails against the traditional attacks.
arxiv
Experimental authentication of quantum key distribution with post-quantum cryptography [PDF]
Liujun Wang+11 more
openalex +1 more source
A Note on Quantum Security for Post-Quantum Cryptography [PDF]
Shor's quantum factoring algorithm and a few other efficient quantum algorithms break many classical crypto-systems. In response, people proposed post-quantum cryptography based on computational problems that are believed hard even for quantum computers. However, security of these schemes against \emph{quantum} attacks is elusive.
openaire +3 more sources
In‐situ atomic‐scale electron microscopy reveals that vacuum‐annealed ferroelectric BaTiO3 (001) surfaces exhibit BaO termination with periodic Ba deficiency and TiOx adunits. Planar oxygen vacancy accumulation in the subsurface TiO2 layer mitigates the depolarization field, facilitating cooperative rumpling of surface and subsurface layers in a tail ...
Jeehun Jeong+5 more
wiley +1 more source
A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture. [PDF]
Lee J, Kim W, Kim JH.
europepmc +1 more source
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature [PDF]
Jiahui Chen+6 more
openalex +1 more source
The Rise of Chalcohalide Solar Cells: Comprehensive Insights From Materials to Devices
This review provides a detailed overview of recent advancements in chalcohalide solar cells, focusing on structure design, material chemistry, synthesis methods, and device optimization. It also highlights future directions for improving device efficiency through innovative device architectures and synthesis techniques, addressing key challenges in ...
Hongrui Zhang+7 more
wiley +1 more source
Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories
We introduce the concept of cryptographic reduction, in analogy with a similar concept in computational complexity theory. In this framework, class $A$ of crypto-protocols reduces to protocol class $B$ in a scenario $X$, if for every instance $a$ of $A$,
Aravinda, S.+3 more
core +1 more source