Results 71 to 80 of about 15,281 (273)
Designing a Block Cipher in Galois Extension Fields for IoT Security
This paper focuses on a block cipher adaptation of the Galois Extension Fields (GEF) combination technique for PRNGs and targets application in the Internet of Things (IoT) space, an area where the combination technique was concluded as a quality stream ...
Kiernan George, Alan J. Michaels
doaj +1 more source
Towards the AlexNet Moment for Homomorphic Encryption: HCNN, theFirst Homomorphic CNN on Encrypted Data with GPUs [PDF]
Deep Learning as a Service (DLaaS) stands as a promising solution for cloud-based inference applications. In this setting, the cloud has a pre-learned model whereas the user has samples on which she wants to run the model.
Aung, Khin Mi Mi +8 more
core +1 more source
TOPOLOGICAL MATTER, MIRROR SYMMETRY AND NON-CRITICAL (SUPER)STRINGS [PDF]
We study the realization of the (super) conformal topological symmetry in two-dimensional field theories. The mirror automorphism of the topological algebra is represented as a reflection in the space of fields.
A.V. Ramallo +50 more
core +2 more sources
An injectable cold atmospheric plasma‐activated decellularized tumor extracellular matrix hydrogel is introduced as a post‐surgical immunoactivation platform. The engineered gel attracts residual tumor cells and induces immunogenic cell death, reshaping the tumor microenvironment and eliciting systemic antitumor immunity. In combination with checkpoint
Tianxu Fang +5 more
wiley +1 more source
Algorithms for estimating modular numbers in floating-point arithmetic
In the residue number system (RNS), the operations of addition, subtraction, and multiplication are executed in parallel for different digits (residues) of the modular numbers.
Konstantin Sergeevich Isupov
doaj
A Nb‐proximitized Josephson junction based on a WTe2/α‐Fe2O3 heterostructure exhibits a robust superconducting diode effect with programmable polarity. The diode direction can be trained by magnetic fields and switched by temperature cycling, revealing tunable finite‐momentum pairing states and competing superconducting states in symmetry‐broken ...
Enze Zhang +9 more
wiley +1 more source
A Residual Chaotic System for Image Security and Digital Video Watermarking
Multimedia data security has become a noticeable problem in the continuous development of multimedia technology. Traditional chaotic systems usually require larger bit-width iterative calculations to affect the generation rate of chaotic systems when ...
Guoxiang Tong +3 more
doaj +1 more source
All‐Optical Reconfigurable Physical Unclonable Function for Sustainable Security
An all‐optical reconfigurable physical unclonable function (PUF) is demonstrated using plasmonic coupling–induced sintering of optically trapped gold nanoparticles, where Brownian motion serves as a robust entropy source. The resulting optical PUF exhibits high encoding density, strong resistance to modeling attacks, and practical authentication ...
Jang‐Kyun Kwak +4 more
wiley +1 more source
Modular Arithmetic Based on Boolean Functions: A Divide and Conquer Approach
This paper introduces a new method for designing modular arithmetic units, for reduction ( $X (mod\ P)$ ), multiplication ( $(A\cdot B) (mod\ P)$ ), and multiplication by a constant ( $(constant\cdot A)(mod \ P)$ ).
Danila Gorodecky, Leonel Sousa
doaj +1 more source
Why Is the Mechanism Underlying the Chiral‐Induced Selectivity Effect Still Challenging?
The chiral‐induced spin selectivity (CISS) effect is observed in many experimental configurations and for different materials. However, there are theoretical challenges in attempting to explain those results. A qualitative framework for explaining all the results is presented.
Ron Naaman, Yossi Paltiel
wiley +1 more source

