Results 141 to 150 of about 1,484,925 (333)
Energy Efficiency Analysis of Post-Quantum Cryptographic Algorithms
Crystal Andrea Roma +2 more
openalex +1 more source
Vacuum‐based deposition is promising for perovskite solar cells to be successfully commercialized. However, co‐evaporation, the most common vapor phase deposition technique, suffers from very low deposition rates. In this work, we reveal that high deposition rates can lead to carbon flakes depositing into the perovskite absorber layers due to material ...
Thomas Feeney +13 more
wiley +1 more source
Automated Verification of Equivalence on Quantum Cryptographic Protocols
Takahiro Kubota +4 more
openalex +2 more sources
Multiple Twinning in Nacre and Aragonite
Electron backscatter diffraction map of a cluster of geologic aragonite, exhibiting single, double, and triple twins. The whole cluster is approximately 2 cm wide. Colors indicate crystal orientations, so that pixels where the a‐, b‐, and c‐axis is perpendicular to the image plane are green, red, and blue, respectively.
Connor A. Schmidt +7 more
wiley +1 more source
In situ monitoring of bulk photoalignment reveals how molecular weight, azobenzene content, cooling rate, and thickness govern ordering in main‐chain liquid crystalline polymers. Optimized copolymers exceed conventional thickness limits, maintaining stable alignment up to 130 µm with high energy efficiency and reversible optical patterning.
Jaechul Ju +3 more
wiley +1 more source
A new non-commutative key exchange protocol on combinatorial semigroup
Since the launch of the post-quantum cryptography standardization project by NIST, post-quantum cryptography has become a prominent research area. Non-commutative cryptography constructed using NP-complete problems is widely regarded resistant to quantum
Jing Zhang, Ya-Juan Yang, JingJing Bao
doaj +1 more source
International Symposium on Mathematics, Quantum Theory, and Cryptography
Tsuyoshi Takagi +5 more
openalex +1 more source
Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks [PDF]
Tiago M. Fernández‐Caramés +1 more
openalex +1 more source
QuantIoT Novel Quantum Resistant Cryptographic Algorithm for Securing IoT Devices: Challenges and Solution [PDF]
Mansoor Farooq +2 more
openalex +1 more source

