Results 51 to 60 of about 6,908 (279)

Quantum Security of a Compact Multi-Signature

open access: yesCryptography
With the rapid advances in quantum computing, quantum security is now an indispensable property for any cryptographic system. In this paper, we study how to prove the security of a complex cryptographic system in the quantum random oracle model. We first
Shaoquan Jiang
doaj   +1 more source

Efficient and provably-secure certificateless sequential aggregate signature scheme

open access: yesTongxin xuebao, 2022
Aiming at the problem that current schemes mostly let the latter signer to verify the multiple signatures of the previous signer, and the message is signed and then passed to the next signer, leading to the efficiency problem of long overall signature ...
Zhu WANG   +5 more
doaj  

Blockchain Certificateless Encryption Mechanism Based on National Secret Algorithm [PDF]

open access: yesJisuanji kexue
The blockchain has attracted widespread attention because of its distributed,non-tamperable and inherent immutability features.However,the international cryptographic algorithm used in the blockchain has certain backdoor security risks.Based on the ...
XIANG Yanjie, HUANG Xiaofang, XIANG Kefeng, ZHENG Ji’nan
doaj   +1 more source

What to Make and How to Make It: Combining Machine Learning and Statistical Learning to Design New Materials

open access: yesAdvanced Intelligent Discovery, EarlyView.
Combining machine learning and probabilistic statistical learning is a powerful way to discover and design new materials. A variety of machine learning approaches can be used to identify promising candidates for target applications, and causal inference can help identify potential ways to make them a reality.
Jonathan Y. C. Ting, Amanda S. Barnard
wiley   +1 more source

Provably Secure Covert Communication on Blockchain

open access: yesCryptography, 2018
Blockchain is a public open ledger that provides data integrity in a distributed manner. It is the underlying technology of cryptocurrencies and an increasing number of related applications, such as smart contracts. The open nature of blockchain together
Juha Partala
doaj   +1 more source

Flexible Memory: Progress, Challenges, and Opportunities

open access: yesAdvanced Intelligent Discovery, EarlyView.
Flexible memory technology is crucial for flexible electronics integration. This review covers its historical evolution, evaluates rigid systems, proposes a flexible memory framework based on multiple mechanisms, stresses material design's role, presents a coupling model for performance optimization, and points out future directions.
Ruizhi Yuan   +5 more
wiley   +1 more source

\({\ell_0}\) Optimization with Robust Non-Oracular Quantum Search

open access: yesTechnologies, 2023
In this article, we introduce an innovative hybrid quantum search algorithm, the Robust Non-oracle Quantum Search (RNQS), which is specifically designed to efficiently identify the minimum value within a large set of random numbers.
Tianyi Zhang , Yuan Ke
doaj   +1 more source

Large Language Model in Materials Science: Roles, Challenges, and Strategic Outlook

open access: yesAdvanced Intelligent Discovery, EarlyView.
Large language models (LLMs) are reshaping materials science. Acting as Oracle, Surrogate, Quant, and Arbiter, they now extract knowledge, predict properties, gauge risk, and steer decisions within a traceable loop. Overcoming data heterogeneity, hallucinations, and poor interpretability demands domain‐adapted models, cross‐modal data standards, and ...
Jinglan Zhang   +4 more
wiley   +1 more source

Advanced Experiment Design Strategies for Drug Development

open access: yesAdvanced Intelligent Discovery, EarlyView.
Wang et al. analyze 592 drug development studies published between 2020 and 2024 that applied design of experiments methodologies. The review surveys both classical and emerging approaches—including Bayesian optimization and active learning—and identifies a critical gap between advanced experimental strategies and their practical adoption in ...
Fanjin Wang   +3 more
wiley   +1 more source

Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments

open access: yesIEEE Access, 2018
As an extremely significant cryptographic primitive, certificateless signature (CLS) schemes can provide message authentication with no use of traditional digital certificates.
Bo Zhang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy