Ultraflat, Monolithic, Highly Stable Supercontinuum Source Based on Fluorotellurite Fiber
An ultraflat, broadband‐coverage, high‐power midinfrared supercontinuum laser source is proposed and thoroughly studied. The nonlinear medium is a fluorotellurite fiber with stable thermal properties, high nonlinear coefficient, and good water resistance.
Hao Lei +10 more
wiley +1 more source
Research advances in molecular mechanisms regulating heat tolerance in cool‐season turfgrasses
Abstract Cool‐season turfgrasses widely used on golf courses, athletic fields, and other landscapes are environmentally and economically important, but they are functionally and aesthetically damaged under prolonged exposure to high temperatures because of their sensitivity to heat stress.
Stephanie Rossi, Bingru Huang
wiley +1 more source
Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley +1 more source
In recent years, various smart devices based on IoT technology, such as smart homes, healthcare, detection, and logistics systems, have emerged. However, as the number of IoT-connected devices increases, securing the IoT is becoming increasingly ...
Lin Yang
doaj +1 more source
FPGA Implementation of Compact Hardware Accelerators for Ring-Binary-LWE-based Post-quantum Cryptography [PDF]
Pengzhou He +3 more
openalex +1 more source
CIDER: Cyber‐Security in Industrial IoT Using Deep Learning and Ring Learning with Errors
This paper proposes secure measures using deep machine learning‐based intrusion detection and advanced encryption schemes based on lattice‐based cryptography on the cloud‐edge‐fog IIoT architecture. The evaluation experiments performed on the Ton_IoT dataset show that the deep learning models have a very good accuracy of around 92% for attack ...
Siu Ting Tsoi, Anish Jindal
wiley +1 more source
Algebraic aspects of solving Ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm [PDF]
We provide a reduction of the Ring-LWE problem to Ring-LWE problems in subrings, in the presence of samples of a restricted form (i.e. $(a,b)$ such that $a$ is restricted to a multiplicative coset of the subring).
Stange, Katherine E.
core +1 more source
LWE from non-commutative group rings [PDF]
Qi Cheng, Jun Zhang, Jincheng Zhuang
openalex +1 more source
The Potential for Machine Learning Analysis over Encrypted Data in Cloud-based Clinical Decision Support - Background and Review [PDF]
This paper appeared at the 8th Australasian Workshop on Health Informatics and Knowledge Management (HIKM 2015), Sydney, Australia, January 2015. Conferences in Research and Practice in Information Technology (CRPIT), Vol.
Basilakis, J, Javadi, B, Maeder, Anthony
core
Algorithms on Ideal over Complex Multiplication order [PDF]
We show in this paper that the Gentry-Szydlo algorithm for cyclotomic orders, previously revisited by Lenstra-Silverberg, can be extended to complex-multiplication (CM) orders, and even to a more general structure.
Kirchner, Paul
core +1 more source

