Results 111 to 120 of about 5,156 (239)
Public-key cryptography based on bounded quantum reference frames
Lawrence M. Ioannou, Michele Mosca
openalex +2 more sources
Comparative Analysis of RSA and ElGamal Cryptographic Public-key Algorithms [PDF]
Andysah Putera Utama Siahaan+2 more
openalex +1 more source
Designing Physical Unclonable Functions From Optically Active Materials
Assigning unforgeable “fingerprints” to manufactured goods is a key strategy to fight global counterfeiting. Optical physical unclonable functions (PUFs) are chemically generated random patterns of optically active materials serving as unique authenticators.
Maxime Klausen+2 more
wiley +1 more source
Conic curve encryption and digital signature based on complex number theory for cybersecurity applications. [PDF]
Kamal A+3 more
europepmc +1 more source
An overview of public key cryptography [PDF]
openaire +3 more sources
Relations between arithmetic geometry and public key cryptography
Gerhard Frey
openalex +1 more source
Computational Thinking Enrichment: Public-Key Cryptography [PDF]
Frances Rosamond
openalex +1 more source
This review explores the transformative role of AI in biosensor technology and provides a holistic interdisciplinary perspective that covers a broader scope of AI‐enabled biosensor technologies across various sectors including healthcare, environmental monitoring, food safety, and agriculture. It also highlights the important role of novel materials in
Tuğba Akkaş+4 more
wiley +1 more source
Exploring the intersection of natural sciences and information technology via entropy and randomness. [PDF]
Luescher AM, Heckel R, Grass RN.
europepmc +1 more source
WITHDRAWN: Quantum cryptography: Public key distribution and coin tossing
Charles H. Bennett, Gilles Brassard
openalex +1 more source