Results 91 to 100 of about 1,469,683 (369)

Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process

open access: yesTechnologies
As quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC).
Kanza Cherkaoui Dekkaki   +2 more
semanticscholar   +1 more source

A RISC-V Post Quantum Cryptography Instruction Set Extension for Number Theoretic Transform to Speed-Up CRYSTALS Algorithms

open access: yesIEEE Access, 2021
In recent years, public-key cryptography has become a fundamental component of digital infrastructures. Such a scenario has to face a new and increasing threat, represented by quantum computers.
P. Nannipieri   +5 more
semanticscholar   +1 more source

Removing Homocoupling Defects in Alkoxy/Alkyl‐PBTTT Enhances Polymer:Fullerene Co‐Crystal Formation and Stability

open access: yesAdvanced Functional Materials, EarlyView.
PBTTT‐OR‐R, a C14‐alkoxy/alkyl‐PBTTT polymer derivative, is of substantial interest for optoelectronics due to its specific fullerene intercalation behavior and enhanced charge‐transfer absorption. Comparing this polymer with (S) and without (O) homocoupling defects reveals that PBTTT‐OR‐R(O) forms stable co‐crystals with PC61BM, while PBTTT‐OR‐R(S ...
Zhen Liu   +14 more
wiley   +1 more source

Exploring Dipolar Dynamics and Ionic Transport in Metal‐Organic Frameworks: Experimental and Theoretical Insights

open access: yesAdvanced Functional Materials, EarlyView.
In this study, the interplay of dipolar dynamics and ionic charge transport in MOF compounds is investigated. Synthesizing the novel structure CFA‐25 with integrated freely rotating dipolar groups, local and macroscopic effects, including interactions with Cs cations are explored.
Ralph Freund   +6 more
wiley   +1 more source

Quantum cryptography

open access: yesIEEE Security & Privacy, 2004
Though most people think they are science fiction, quantum cryptography systems are now operational, with prototypes protecting Internet traffic across metropolitan areas. These systems are so novel that we can consider quantum cryptography, or more properly, quantum key distribution (QKD), as the third and final insight to transform cryptography in ...
Harry Paul, Igor Jex
openaire   +4 more sources

Horizontal federated learning and assessment of Cox models

open access: yesFrontiers in Digital Health
The Cox Proportional Hazards model is a widely used method for survival analysis in medical research. However, training an accurate model requires access to a sufficiently large dataset, which is often challenging due to data fragmentation.
Frank Westers, Sam Leder, Lucia Tealdi
doaj   +1 more source

New Trends in Quantum Computing

open access: yes, 1996
Classical and quantum information are very different. Together they can perform feats that neither could achieve alone, such as quantum computing, quantum cryptography and quantum teleportation.
Brassard, Gilles
core   +2 more sources

3D Printed Ultra‐Fast Plastic Scintillators Based on Perovskite‐Photocurable Polymer Composite

open access: yesAdvanced Functional Materials, Volume 35, Issue 12, March 18, 2025.
The demand for radiation detection is increasing in a number of fields, including high‐energy physics, medical imaging, and homeland security. This study serves to demonstrate the potential for the fabrication of fast perovskite‐based scintillators with complex shapes via stereolithographic additive manufacturing, representing a new path toward the ...
Antonella Giuri   +16 more
wiley   +1 more source

Enhancing satellite‐to‐ground communication using quantum key distribution

open access: yesIET Quantum Communication, 2023
Classical Cryptography has been in use for a long time. It has been the only way of securing people's communication. However, there are some flaws observed during the execution of classical cryptography.
Keshav Kasliwal   +3 more
doaj   +1 more source

QKD-Enhanced Cybersecurity Protocols

open access: yesIEEE Photonics Journal, 2021
Security of QKD is guaranteed by the quantum mechanics laws rather than unproven assumptions employed in computational cryptography. Unfortunately, the secret-key rates are way too low and transmission distances are limited. The post-quantum cryptography
Ivan B. Djordjevic
doaj   +1 more source

Home - About - Disclaimer - Privacy