Results 61 to 70 of about 25,460 (262)

Applying Grover's algorithm to AES: quantum resource estimates

open access: yes, 2015
We present quantum circuits to implement an exhaustive key search for the Advanced Encryption Standard (AES) and analyze the quantum resources required to carry out such an attack.
A Barenco   +17 more
core   +1 more source

Mapping Nanoscale Protein‐Corona Kinetics of DoE‐Optimized Perfluorocarbon Encapsulated‐PLGA Nanoparticles by In Situ, Time‐Resolved Synchrotron SAXS

open access: yesAdvanced Healthcare Materials, EarlyView.
A two‐phase workflow (OFAT screening followed by central composite design) maps how processing variables tune PFCE‐PLGA nanoparticle size, dispersity, surface charge, loading, and 19F‐MRI signal. In situ, time‐resolved synchrotron SAXS tracks albumin‐corona growth on intact dispersions and reveals PFCE‐dependent adsorption pathways.
Joice Maria Joseph   +11 more
wiley   +1 more source

Implementing Post-quantum Cryptography for Developers

open access: yesSN Computer Science, 2023
AbstractWidely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose of protecting sensitive data against attacks with quantum computers. National Institute of Standards and Technology has recently reached the end of the third round of post-quantum standardization ...
Hekkala Julius   +4 more
openaire   +7 more sources

Plasmonic Enhancement of Fluorescence and Protein Dynamics in Living Mammalian Cells

open access: yesAdvanced Materials, EarlyView.
This study demonstrates plasmonic enhancement of the function of fluorescent voltage sensing proteins (genetically encoded voltage indicators, (GEVIs), QuasAr6) in live mammalian cells. Coupling to plasmonic nanoparticles does not just increase fluorescence, but influences the protein photocycle, creating a hybrid sensor with its response speed to ...
Marco Locarno   +16 more
wiley   +1 more source

DAGS: Key encapsulation using dyadic GS codes

open access: yesJournal of Mathematical Cryptology, 2018
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.
Banegas Gustavo   +12 more
doaj   +1 more source

Complete elimination of information leakage in continuous-variable quantum communication channels [PDF]

open access: yes, 2018
In all lossy communication channels realized to date, information is inevitably leaked to a potential eavesdropper. Here we present a communication protocol that does not allow for any information leakage to a potential eavesdropper in a purely lossy ...
Andersen, Ulrik L.   +4 more
core   +3 more sources

Artificial Intelligence‐Assisted Workflow for Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling

open access: yesAdvanced Materials, EarlyView.
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll   +19 more
wiley   +1 more source

The complexity of MinRank [PDF]

open access: yes, 2019
In this note, we leverage some of our results from arXiv:1706.06319 to produce a concise and rigorous proof for the complexity of the generalized MinRank Problem in the under-defined and well-defined case.
Caminata, Alessio, Gorla, Elisa
core   +2 more sources

Stepwise On‐Surface Synthesis and Transformations of Two‐Dimensional Covalent Organic Frameworks by Controlled Thermal Stimuli

open access: yesAdvanced Materials, EarlyView.
The seminal transformation of a 2D‐COF (SURFCOF‐IMDEA1) into a 2D porous COF (SURFCOF‐IMDEA2) on Au(111) by a sequential C‐C coupling and ladderization triggered by thermal annealing steps at increasing temperatures is reported. Abstract The development of covalent organic frameworks (COFs) is currently a primary objective in materials science, taking ...
Ana Barragán   +11 more
wiley   +1 more source

SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function

open access: yes, 2020
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N.   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy