Results 121 to 130 of about 243,777 (279)
Engineering Strategies for Stable and Long‐Life Alkaline Zinc‐Based Flow Batteries
Alkaline zinc‐based flow batteries face persistent challenges from unstable zinc deposition, including dendrite growth, passivation, corrosion, and hydrogen evolution, which severely limit cycling stability. Current research addresses these issues through coordinated electrode structuring, electrolyte regulation, and membrane design to control zinc ...
Yuran Bai +6 more
wiley +1 more source
Multi-LFSR Architectures for BRLWE-Based Post Quantum Cryptography
The advancement in quantum computing has led to a significant progress in the development of public-key cryptosystems, referred as Post Quantum Cryptography (PQC) which has robust security to withstand both classical and quantum attacks.
Shaik Ahmadunnisa, Sudha Ellison Mathe
doaj +1 more source
Algorithmic Design of Disordered Networks With Arbitrary Coordination: Application to Biophotonics
Predictive Design of Disordered Networks: Disordered network‐like morphologies are abundant in nature, from cytoskeletal networks to bone structures and chalcogenide glasses. These structures are naturally hard to characterize. A new algorithmic tool extends the established Wooten–Weaire–Winer (WWW) algorithm to valencies above 4.
Florin Hemmann +3 more
wiley +1 more source
Multi‐Scale Interface Engineering of MXenes for Multifunctional Sensory Systems
MXenes, as two‐dimensional transition metal carbides and nitrides, demonstrate remarkable capabilities for multifunctional sensing applications. This review systematically examines multi‐scale interface engineering approaches that enhance sensing performance, enable diverse detection functionalities, and improve system‐level compatibility in MXene ...
Jiaying Liao, Sin‐Yi Pang, Jianhua Hao
wiley +1 more source
An MLWE-Based Cut-and-Choose Oblivious Transfer Protocol
The existing lattice-based cut-and-choose oblivious transfer protocol is constructed based on the learning-with-errors (LWE) problem, which generally has the problem of inefficiency.
Yongli Tang +5 more
doaj +1 more source
Ferroelectric tunnel junction devices based on epitaxial undoped ferroelectric HfO2 films demonstrate stable switching endurance of over 106 switching cycles, low write voltages of ±3 V, 16 measured resistance states, and neuromorphic capability.
Markus Hellenbrand +13 more
wiley +1 more source
Atomic Layer Deposition in Transistors and Monolithic 3D Integration
Transistors are fundamental building blocks of modern electronics. This review summarizes recent progress in atomic layer deposition (ALD) for the synthesis of two‐dimensional (2D) metal oxides and transition‐metal dichalcogenides (TMDCs), with particular emphasis on their enabling role in monolithic three‐dimensional (M3D) integration for next ...
Yue Liu +5 more
wiley +1 more source
Quantum delegation from fully homomorphic encryption based on Ring learning with errors
Quantum computers will not likely be widespread and accessible to everyone in a foreseen future. Being capable of delegating quantum computation to untrusted parties while not losing condentiality would individuals to grant access to this technology. On the other hand, many current cryptography applications rely on the hardness of solving the discrete ...
openaire +1 more source
We used multiple analytical techniques at the Psiché beamline, Synchrotron Soleil, and at D20 instrument in Institut Laue Langevin, to study the densification of thiophosphate solid electrolytes Li3PS4 and Li6PS5Cl. Our combined X‐ray diffraction, absorption tomography, absorption density, neutron power diffraction, and ionic conductivity analyses ...
Oskar Thompson +11 more
wiley +1 more source
The Ring Learning With Error (RLWE) algorithm plays a crucial role in Post Quantum Cryptography (PQC) and Homomorphic Encryption (HE). The security of existing classical crypto algorithms is reduced in quantum computers. The adversaries can store all encrypted data and once quantum computers become available, they can potentially expose this encrypted ...
Paresh Baidya +2 more
openaire +2 more sources

