Results 61 to 70 of about 25,460 (262)
Applying Grover's algorithm to AES: quantum resource estimates
We present quantum circuits to implement an exhaustive key search for the Advanced Encryption Standard (AES) and analyze the quantum resources required to carry out such an attack.
A Barenco +17 more
core +1 more source
A two‐phase workflow (OFAT screening followed by central composite design) maps how processing variables tune PFCE‐PLGA nanoparticle size, dispersity, surface charge, loading, and 19F‐MRI signal. In situ, time‐resolved synchrotron SAXS tracks albumin‐corona growth on intact dispersions and reveals PFCE‐dependent adsorption pathways.
Joice Maria Joseph +11 more
wiley +1 more source
Implementing Post-quantum Cryptography for Developers
AbstractWidely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose of protecting sensitive data against attacks with quantum computers. National Institute of Standards and Technology has recently reached the end of the third round of post-quantum standardization ...
Hekkala Julius +4 more
openaire +7 more sources
Plasmonic Enhancement of Fluorescence and Protein Dynamics in Living Mammalian Cells
This study demonstrates plasmonic enhancement of the function of fluorescent voltage sensing proteins (genetically encoded voltage indicators, (GEVIs), QuasAr6) in live mammalian cells. Coupling to plasmonic nanoparticles does not just increase fluorescence, but influences the protein photocycle, creating a hybrid sensor with its response speed to ...
Marco Locarno +16 more
wiley +1 more source
DAGS: Key encapsulation using dyadic GS codes
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.
Banegas Gustavo +12 more
doaj +1 more source
Complete elimination of information leakage in continuous-variable quantum communication channels [PDF]
In all lossy communication channels realized to date, information is inevitably leaked to a potential eavesdropper. Here we present a communication protocol that does not allow for any information leakage to a potential eavesdropper in a purely lossy ...
Andersen, Ulrik L. +4 more
core +3 more sources
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll +19 more
wiley +1 more source
The complexity of MinRank [PDF]
In this note, we leverage some of our results from arXiv:1706.06319 to produce a concise and rigorous proof for the complexity of the generalized MinRank Problem in the under-defined and well-defined case.
Caminata, Alessio, Gorla, Elisa
core +2 more sources
The seminal transformation of a 2D‐COF (SURFCOF‐IMDEA1) into a 2D porous COF (SURFCOF‐IMDEA2) on Au(111) by a sequential C‐C coupling and ladderization triggered by thermal annealing steps at increasing temperatures is reported. Abstract The development of covalent organic frameworks (COFs) is currently a primary objective in materials science, taking ...
Ana Barragán +11 more
wiley +1 more source
SPHINCS$^+$ post-quantum digital signature scheme with Streebog hash function
Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in
Anufriev, M. N. +5 more
core +1 more source

