Results 41 to 50 of about 25,460 (262)

Adapting the BIKE Key Encapsulation Mechanism to Memory-Constrained IoT Devices

open access: yesCryptography
Post-quantum cryptography represents one of the most promising areas of modern cryptography. The development in this discipline significantly accelerated after it became of interest to the National Institute of Standards and Technology (NIST). One of the
Dušan Čatloch   +2 more
doaj   +1 more source

Device-independent quantum key distribution from computational assumptions

open access: yesNew Journal of Physics, 2021
In device-independent quantum key distribution (DIQKD), an adversary prepares a device consisting of two components, distributed to Alice and Bob, who use the device to generate a secure key.
Tony Metger   +3 more
doaj   +1 more source

Cathodic Cage Plasma Deposition of Nanostructured Cu–Fe–Se Coatings on Poly(methyl Methacrylate)

open access: yesAdvanced Engineering Materials, EarlyView.
Nanostructured Cu–Fe–Se coatings are deposited on PMMA by a modified cathodic cage plasma process, enabling low‐temperature deposition on polymer substrates. A transition from discontinuous to compact morphology is observed with temperature, with optimal properties at 200°C, where improved CuFeSe2‐type bonding, lowest sheet resistance, and favorable ...
V. S. S. Sobrinho   +8 more
wiley   +1 more source

Complying with the NIST post-quantum cryptography standards and decentralizing artificial intelligence: methodology for quantum-resistant and privacy-preserving digital identity systems

open access: yesFrontiers in Blockchain
IntroductionDigital identity infrastructures used in electronic passports, national eID schemes, and federated authentication systems rely predominantly on centralised registries and classical public key cryptography.
Petar Radanliev   +4 more
doaj   +1 more source

Cloud Computing in the Quantum Era [PDF]

open access: yes, 2019
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud.
Kaiiali, Mustafa   +2 more
core   +2 more sources

Electroactive Metal–Organic Frameworks for Electrocatalysis

open access: yesAdvanced Functional Materials, EarlyView.
Electrocatalysis is crucial in sustainable energy conversion as it enables efficient chemical transformations. The review discusses how metal–organic frameworks can revolutionize this field by offering tailorable structures and active site tunability, enabling efficient and selective electrocatalytic processes.
Irena Senkovska   +7 more
wiley   +1 more source

Photon Avalanching Nanoparticles: The Next Generation of Upconverting Nanomaterials?

open access: yesAdvanced Functional Materials, EarlyView.
This Perspective outlines the mechanistic foundations that enable photon‐avalanche (PA) behavior in lanthanide nanomaterials and contrasts them with emerging application spaces and forward‐looking design strategies. By bridging threshold engineering, energy‐transfer dynamics, and materials engineering, we provide a coherent roadmap for advancing the ...
Kimoon Lee   +7 more
wiley   +1 more source

Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories

open access: yes, 2015
We introduce the concept of cryptographic reduction, in analogy with a similar concept in computational complexity theory. In this framework, class $A$ of crypto-protocols reduces to protocol class $B$ in a scenario $X$, if for every instance $a$ of $A$,
Aravinda, S.   +3 more
core   +1 more source

THE STATE OF STANDARDIZATION OF POST-QUANTUM CRYPTO-ALGORITHMS AT THE GLOBAL LEVEL

open access: yesАвтоматизация технологических и бизнес-процессов, 2023
. In the digital age, cryptography is widely used in various important systems such as financial, military and government ones, medical records etc. The life of modern people is closely connected with the cryptography.
Oleksandra Tsentseria   +3 more
doaj   +1 more source

Post Quantum Cryptography from Mutant Prime Knots

open access: yes, 2010
By resorting to basic features of topological knot theory we propose a (classical) cryptographic protocol based on the `difficulty' of decomposing complex knots generated as connected sums of prime knots and their mutants.
Adams C.   +13 more
core   +1 more source

Home - About - Disclaimer - Privacy