Results 131 to 140 of about 90,635 (323)
Status report on the first round of the NIST post-quantum cryptography standardization process
,
G. Alagic+11 more
semanticscholar +1 more source
Some application of difference equations in Cryptography and Coding Theory [PDF]
In this paper, we present some applications of a difference equation of degree k in Cryptography and Coding Theory.
arxiv
External and Internal Factors Influencing the Adoption of Post-Quantum Cryptography in Companies [PDF]
Paulina Schindler
openalex +1 more source
An virtual reality augmented‐reality‐ and motion‐capture‐assisted surface remanufacturing system is presented. Operators can interactively reconstruct the virtual model using the designed motion‐captured pointer directly on the physical workpiece surface. Operators can intuitively and interactively manipulate the system to accomplish tasks ranging from
Guoliang Liu, Wenlei Sun, Pinwen Li
wiley +1 more source
Tetra‐ortho‐Azobenzenes (TOABs) in broad daylight: in recent years, TOAB photoswitches became indispensable tools for all‐visible‐light manipulation of chemistry, biology and materials. This review explores their unique photochemical properties, design and synthetic approaches, offering support in choosing a TOAB for a given application.
Francesca Cardano+2 more
wiley +2 more sources
Problems in group theory motivated by cryptography [PDF]
This is a survey of algorithmic problems in group theory, old and new, motivated by applications to cryptography.
arxiv
KINA: Karatsuba Initiated Novel Accelerator for Ring-Binary-LWE (RBLWE)-based Post-Quantum Cryptography [PDF]
Pengzhou He+3 more
openalex +1 more source
It is known that biomaterial properties (e.g., shape, chemistry) direct how the body reacts to implanted materials. However, what features cause specific responses is not well known. High‐throughput screening can identify instructive properties, but manual feature segmentation in large brightfield image datasets limits discovery.
Robert Owen+10 more
wiley +1 more source
Mapping Interictal activity in epilepsy using a hidden Markov model: A magnetoencephalography study
In this study, we use hidden Markov modeling (HMM) to create a unique statistical model of interictal brain activity for 10 pediatric epilepsy patients. This data‐driven model produces an output unique to each patient, and is used to localize the epileptogenic area(s).
Zelekha A. Seedat+13 more
wiley +1 more source
An automated experimental workflow to accelerate the discovery of metal‐organic cages (MOCs), which is often hindered by slow, manual approaches, has been developed. Automation of the synthesis, characterization, and analysis, is supported by computational modelling to rationalize the experimental outcomes, and development of a host–guest assay ...
Annabel R. Basford+8 more
wiley +2 more sources