Results 51 to 60 of about 26,053 (287)
Post-Quantum Cryptography: S381 Cyclic Subgroup of High Order
Currently there is an active Post-Quantum Cryptography (PQC) solutions search, which attempts to find cryptographic protocols resistant to attacks by means of for instance Shor polynomial time algorithm for numerical field problems like integer ...
Hecht, Pedro
core +1 more source
The complexity of MinRank [PDF]
In this note, we leverage some of our results from arXiv:1706.06319 to produce a concise and rigorous proof for the complexity of the generalized MinRank Problem in the under-defined and well-defined case.
Caminata, Alessio, Gorla, Elisa
core +2 more sources
A reproducible synthesis to control 3D/0D phase ratios via water‐tuned solvent–antisolvent methods is presented. Enhanced scintillation yield and ultrafast decay are achieved. Defect‐driven emission mechanisms are revealed through cathodoluminescence and radioluminescence, shedding light on the underexplored role of the 0D Cs4PbBr6 and mixed 0D/3D ...
Mario Calora +18 more
wiley +1 more source
PP-PQB: Privacy-Preserving in Post-Quantum Blockchain-Based Systems: A Systematization of Knowledge
Blockchain technology has produced effective solutions and provides security by using cryptographic tools for various applications, attracting attention from the academic community.
Bora Bugra Sezer +2 more
doaj +1 more source
Herein presented supraparticles combine the nanoparticulate photocatalyst graphitic carbon nitride with the enzyme horseradish peroxidase, which is immobilized on silica nanoparticles. In an optimized compatibility range, both catalysts operate effectively within the hybrid supraparticles and catalyze a cascade reaction consisting of the photocatalytic
Bettina Herbig +11 more
wiley +1 more source
A new non-commutative key exchange protocol on combinatorial semigroup
Since the launch of the post-quantum cryptography standardization project by NIST, post-quantum cryptography has become a prominent research area. Non-commutative cryptography constructed using NP-complete problems is widely regarded resistant to quantum
Jing Zhang, Ya-Juan Yang, JingJing Bao
doaj +1 more source
SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N. +5 more
core +1 more source
This review explores functional and responsive materials for triboelectric nanogenerators (TENGs) in sustainable smart agriculture. It examines how particulate contamination and dirt affect charge transfer and efficiency. Environmental challenges and strategies to enhance durability and responsiveness are outlined, including active functional layers ...
Rafael R. A. Silva +9 more
wiley +1 more source
Decoy state quantum key distribution with two-way classical post-processing [PDF]
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution protocols when a coherent state source is used.
C. H. Bennett +14 more
core +1 more source
Ice Lithography: Recent Progress Opens a New Frontier of Opportunities
This review focuses on recent advancements in ice lithography, including breakthroughs in compatible precursors and substrates, processes and applications, hardware, and digital methods. Moreover, it offers a roadmap to uncover innovation opportunities for ice lithography in fields such as biological, nanoengineering and microsystems, biophysics and ...
Bingdong Chang +9 more
wiley +1 more source

