Results 101 to 110 of about 15,702 (332)
Development of Cryptographic Library Based on algorithms from eSTREAM project
The research and realization of opportunities to improve program implementation of algorithms of eSTREAM project to increase their productivity are presented. The comparison between proposed implementations and author’s implementations was made.
Rostislav Alekseevich Gashin +1 more
doaj
The combination of formamidinium thiocyanate and 1,3‐propane diammonium iodide for bulk and top‐surface passivation, and a ternary fullerene blend to improve energy band alignment, suppresses energy losses in wide‐bandgap FAPbBr3 perovskite solar cells.
Laura Bellini +9 more
wiley +1 more source
Joint Control of Radiated and Surface Waves via Space‐Time Coding Metasurfaces
A unified space‐time coding metasurface platform enables simultaneous control of radiated and surface‐confined waves across multiple harmonics. Demonstrated functionalities include multi‐frequency beam shaping; surface‐wave excitation, and hybrid multiplexing.
Zihao Dai +6 more
wiley +1 more source
Analysis of Atom against quantum attacks
A significant amount of study is being done to review the security promises made for the various ciphers now in use as a result of the development of quantum computing technology.
Ravi Anand, Rimpa Nandi, Takanori Isobe
doaj +1 more source
Integrative Approaches for DNA Sequence‐Controlled Functional Materials
DNA is emerging as a programmable building block for functional materials with applications in biomimicry, biochemical, and mechanical information processing. The integration of simulations, experiments, and machine learning is explored as a means to bridge DNA sequences with macroscopic material properties, highlighting current advances and providing ...
Aaron Gadzekpo +4 more
wiley +1 more source
Stream Ciphers Analysis Methods
The purpose of this paper is to present and to discuss analysis methods applied in symmetric cryptography, especially on stream ciphers. The tests were made on some algorithms and also on the personal symmetric cryptographic algorithm, HENKOS, based on a pseudorandom number generator.
Dominic Bucerzan +3 more
openaire +2 more sources
Droplet Triboelectrification on Liquid‐Like Polymer Brushes
This work investigates the triboelectrification of water droplets on polymer brush‐coated surfaces exhibiting minimal contact line pinning. Such surfaces enable the systematic study of electrode patterning and controlled changes in droplet contact area.
Mohammad Soltani +5 more
wiley +1 more source
Linear Finite State Machines (LFSMs) are particular primitives widely used in information theory, coding theory and cryptography. Among those linear automata, a particular case of study is Linear Feedback Shift Registers (LFSRs) used in many ...
Arnault, François +3 more
core +1 more source
This review highlights how machine learning (ML) algorithms are employed to enhance sensor performance, focusing on gas and physical sensors such as haptic and strain devices. By addressing current bottlenecks and enabling simultaneous improvement of multiple metrics, these approaches pave the way toward next‐generation, real‐world sensor applications.
Kichul Lee +17 more
wiley +1 more source

