Results 161 to 170 of about 24,566 (328)
Error Correcting Codes in Post-Quantum Cryptography
John-Marc Desmarais
openalex +2 more sources
Advanced functionalities and post-quantum security through the lens of lattice-based cryptography [PDF]
Willy Quach
openalex +1 more source
Post-Quantum Cryptography Anonymous Scheme -- PQCWC: Post-Quantum Cryptography Winternitz-Chen
As quantum computing technology matures, it poses a threat to the security of mainstream asymmetric cryptographic methods. In response, the National Institute of Standards and Technology released the final version of post-quantum cryptographic (PQC) algorithm standards in August 2024.
openaire +2 more sources
We introduce an anti‐counterfeiting solution using photoluminescent nanoparticles in PMMA polymer matrices. Through UV‐activated polymerization without photoinitiators, achieved via solvent modification, secure micromarkers are created within seconds using industrial laser systems.
Aïssatou Coumba Sow +3 more
wiley +1 more source
Assessment of Post-Quantum Cryptographic Algorithms
Jennifer Cordaro +3 more
openalex +2 more sources
The crosslinked poly(vinyl alcohol) (X‐PVA) in the presence of acidic polymer catalyst (PAMPSA) is formed in solid‐state films by thermal annealing at 150 ℃ for 10 min, delivering the best hysteresis characteristics for efficient organic synaptic transistors (OSTRs) with a recognition accuracy of 96%.
Seungmok Lee +3 more
wiley +1 more source
Obfuscated Quantum and Post-Quantum Cryptography
In this work, we present an experimental deployment of a new design for combined quantum key distribution (QKD) and post-quantum cryptography (PQC). Novel to our system is the dynamic obfuscation of the QKD-PQC sequence of operations, the number of operations, and parameters related to the operations; coupled to the integration of a GPS-free quantum ...
Rani, Anju +4 more
openaire +2 more sources
This study explores overlapping charge transport mechanisms in TADF materials and identifies spin‐orbit coupling as the dominant mechanism for triplet‐to‐singlet transition in carbazole‐based cyanoarene emitters. Computational investigations reveal a second spin‐orbit‐coupling‐mediated reverse intersystem crossing pathway, significantly enhancing the ...
Annika Morgenstern +13 more
wiley +1 more source
Post-Quantum Migration of the Tor Application
The efficiency of Shor’s and Grover’s algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one’s privacy is potentially vulnerable to retrospective decryption, also known as the harvest now, decrypt ...
Denis Berger +2 more
doaj +1 more source

