Results 91 to 100 of about 243,099 (282)
Evaluation of Post-Quantum Distributed Ledger Cryptography
This paper evaluates the current cybersecurity vulnerability of the prolific use of Elliptical Curve Digital Signature Algorithm (ECDSA) cryptography in use by the Bitcoin Core, Ethereum, Bitcoin Cash, and enterprise blockchains such as ...
Robert E. Campbell Sr.
doaj +1 more source
Context-sensitive Spelling Correction Using Google Web 1T 5-Gram Information
In computing, spell checking is the process of detecting and sometimes providing spelling suggestions for incorrectly spelled words in a text. Basically, a spell checker is a computer program that uses a dictionary of words to perform spell checking. The
Alwani, Mohammad, Bassil, Youssef
core +2 more sources
Photoswitchable Conductive Metal–Organic Frameworks
A conductive material where the conductivity can be modulated remotely by irradiation with light is presented. It is based on films of conductive metal–organic framework type Cu3(HHTP)2 with embedded photochromic molecules such as azobenzene, diarylethene, spiropyran, and hexaarylbiimidazole in the pores.
Yidong Liu +5 more
wiley +1 more source
This paper investigates whether ChatGPT, a large language model, can assist in the implementation of lattice-based cryptography and fully homomorphic encryption algorithms, specifically the Ring Learning-with-Errors encryption scheme and the Brakerski ...
Zhigang Chen +3 more
doaj +1 more source
The layer‐by‐layer (LbL) assembly of coordination solids, enabled by the surface‐mounted metal‐organic framework (SURMOF) platform, is on the cusp of generating the organic counterpart of the epitaxy of inorganics. The programmable and sequential SURMOF protocol, optimized by machine learning (ML), is suited for accessing high‐quality thin films of ...
Zhengtao Xu +2 more
wiley +1 more source
Homomorphic encryption based on the Ring Learning with Errors (RLWE) problem
Verilerin mahremiyetini sağlamak için kullanılan şifreleme teknikleri, teknolojideki gelişmelere uygun olarak değişmekte ve ihtiyaçlara göre şekillenmektedir. Günümüzde şifrelenerek depolanması gereken verilerin miktarının artması, verilerin hem güvenliğini ve hem de verimli bir şekilde kullanılabilirliğini sağlayan şifreleme tekniklerine ihtiyaç ...
openaire +2 more sources
Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings
We extend a commitment scheme based on the learning with errors over rings $$\mathsf{RLWE}$$ problem, and present efficient companion zero-knowledge proofs of knowledge. Our scheme maps elements from the ring or equivalently, n elements from $$\mathbb F_q$$ to a small constant number of ring elements.
Fabrice Benhamouda +3 more
openaire +2 more sources
Why Catastrophic Organizational Failures Happen [PDF]
Excerpt from the introduction: The purpose of this chapter is to examine the major streams of research about catastrophic failures, describing what we have learned about why these failures occur as well as how they can be prevented. The chapter begins
Roberto, Michael A.
core +1 more source
An all‐in‐one analog AI accelerator is presented, enabling on‐chip training, weight retention, and long‐term inference acceleration. It leverages a BEOL‐integrated CMO/HfOx ReRAM array with low‐voltage operation (<1.5 V), multi‐bit capability over 32 states, low programming noise (10 nS), and near‐ideal weight transfer.
Donato Francesco Falcone +11 more
wiley +1 more source
Electroactive Metal–Organic Frameworks for Electrocatalysis
Electrocatalysis is crucial in sustainable energy conversion as it enables efficient chemical transformations. The review discusses how metal–organic frameworks can revolutionize this field by offering tailorable structures and active site tunability, enabling efficient and selective electrocatalytic processes.
Irena Senkovska +7 more
wiley +1 more source

