Results 41 to 50 of about 26,053 (287)

A Survey of Post-Quantum Cryptography: Start of a New Race

open access: yesCryptography, 2023
Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information.
Duc-Thuan Dam   +4 more
doaj   +1 more source

Enhanced Switching Performance in Single‐Crystalline PbTiO3 Ferroelectric Memristors for Replicating Synaptic Plasticity

open access: yesAdvanced Functional Materials, EarlyView.
This study demonstrated single‐crystalline PbTiO3‐based memristors with atomically sharp interfaces, well‐ordered lattices, and minimal lattice mismatch. The devices exhibited an ON/OFF ratio exceeding 105, high stability, and rich resistance‐state modulation.
Haining Li   +7 more
wiley   +1 more source

THE STATE OF STANDARDIZATION OF POST-QUANTUM CRYPTO-ALGORITHMS AT THE GLOBAL LEVEL

open access: yesАвтоматизация технологических и бизнес-процессов, 2023
. In the digital age, cryptography is widely used in various important systems such as financial, military and government ones, medical records etc. The life of modern people is closely connected with the cryptography.
Oleksandra Tsentseria   +3 more
doaj   +1 more source

Decoupling Size and Electronic Effects in Doped SrTiO3 Photocatalysts Through Surface Area–Normalized CO2 Hydrogenation Rates

open access: yesAdvanced Functional Materials, EarlyView.
Exploring the photocatalytic reverse water–gas shift (RWGS) reaction on doped SrTiO3 nanoparticle films, reveals that normalizing catalytic rates by the catalyst's specific surface area (SSA) disentangled surface area effects from the catalyst's intrinsic material properties.
Dikshita Bhattacharyya   +6 more
wiley   +1 more source

Template Attack of LWE/LWR-Based Schemes with Cyclic Message Rotation

open access: yesEntropy, 2022
The side-channel security of lattice-based post-quantum cryptography has gained extensive attention since the standardization of post-quantum cryptography.
Yajing Chang   +3 more
doaj   +1 more source

Fast Quantum Algorithm for Solving Multivariate Quadratic Equations [PDF]

open access: yes, 2017
In August 2015 the cryptographic world was shaken by a sudden and surprising announcement by the US National Security Agency NSA concerning plans to transition to post-quantum algorithms.
Faug`ere, Jean-Charles   +5 more
core   +1 more source

Quantum cryptography with an ideal local relay [PDF]

open access: yes, 2015
We consider two remote parties connected to a relay by two quantum channels. To generate a secret key, they transmit coherent states to the relay, where the states are subject to a continuous-variable (CV) Bell detection.
Andersen, Ulrik L.   +6 more
core   +3 more sources

Electroactive Metal–Organic Frameworks for Electrocatalysis

open access: yesAdvanced Functional Materials, EarlyView.
Electrocatalysis is crucial in sustainable energy conversion as it enables efficient chemical transformations. The review discusses how metal–organic frameworks can revolutionize this field by offering tailorable structures and active site tunability, enabling efficient and selective electrocatalytic processes.
Irena Senkovska   +7 more
wiley   +1 more source

ANALYSIS OF THE CHANGE OF THE CONCEPT «FINANCIAL CRYPTOGRAPHY» ON THE BASIS OF 20 YEARS SUBJECTS OF THE INTERNATIONAL CONFERENCE «FINANCIAL CRYPTOGRAPHY AND DATA SECURITY»

open access: yesСтатистика и экономика, 2016
The article discusses the concept of «financial cryptography», which appeared in 1997 in the eponymous conference title and used abroad to date along with concepts of «quantum cryptography», «post-quantumcryptography», «lightweight cryptography» and ...
Alexander A. Varfolomeev
doaj   +1 more source

A Performance Comparison of Post-Quantum Algorithms in Blockchain

open access: yesThe Journal of The British Blockchain Association, 2022
Blockchain and other Distributed Ledger Technologies (DLTs) have triggered widespread research and interest. This is due to its ability to create redundant, transparent, and accountable connections in various application domains while utilizing ...
Bakhtiyor Yokubov, Lu Gan
doaj   +1 more source

Home - About - Disclaimer - Privacy