Results 81 to 90 of about 26,053 (287)
Status report on the third round of the NIST post-quantum cryptography standardization process
M.V. Yesina +2 more
openalex +3 more sources
PQ-LEACH: A novel post-quantum protocol for securing WSNs communication
Ensuring the confidentiality of communication is of paramount significance. Traditionally, cryptographic practices for Wireless Sensor Networks (WSN) have been primarily based on classical cryptography like RSA and Elliptic Curve, which are potentially ...
Shaykhah S Aldosari, Layla S Aldawsari
doaj +1 more source
A New Family of Ternary Intermetallic Compounds with Dualistic Atomic Ordering – The ZIP Phases
The ZIP phases are ternary intermetallic compounds with dualistic atomic ordering, i.e., they exhibit one face‐centered cubic (fcc; space group Fd3¯$\bar 3$m) variant and one hexagonal (space group P63/mmc) variant. The ZIP phases in the Nb‐Si‐Ni system are the Nb3SiNi2 (fcc) and Ni3SiNb2 (hexagonal) ternary IMCs, crystal structure schematics of which ...
Matheus A. Tunes +24 more
wiley +1 more source
A single object with dual properties – degradable and non‐degradable – is fabricated in a single print simply by switching the printing colors. The advanced multi‐material printing is enabled by the combination of a fully wavelength‐orthogonal photoresin and a monochromatic tunable laser printer, paving the way for precise multi‐material ...
Xingyu Wu +5 more
wiley +1 more source
Quantum key distribution through quantum machine learning: a research review
Quantum cryptography has emerged as a radical research field aimed at mitigating various security threats in modern communication systems. The integration of Quantum Machine Learning (QML) protocols plays a crucial role in enhancing security measures ...
Krupa Purohit, Ajay Kumar Vyas
doaj +1 more source
Energy Efficiency Analysis of Post-Quantum Cryptographic Algorithms
Crystal Andrea Roma +2 more
openalex +1 more source
NTRU_ SSS: Anew Method Signcryption Post Quantum Cryptography Based on Shamir’s Secret Sharing [PDF]
Asma Ibrahim Hussein +2 more
openalex +1 more source
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll +19 more
wiley +1 more source
Quantum vs post‐quantum security for future networks: Survey
Classical cryptography (crypt) schemes (sche) have been compromised by the practical results on quantum (q) computers in recent years. Nowadays these sche ‘s can be compromised by using the Shor's methodology. This paper provides a detailed survey of the
Savo Glisic
doaj +1 more source
Asymptotic security of continuous-variable quantum key distribution with a discrete modulation
We establish a lower bound on the asymptotic secret key rate of continuous-variable quantum key distribution with a discrete modulation of coherent states.
Diamanti, Eleni +3 more
core +3 more sources

