Results 101 to 110 of about 383,874 (285)
Energy Efficient Encryption Algorithm for Low Resources Devices
Saving energy is one of the most challenging aspects in the wireless network devices. Such devices are connected together to perform a certain task. A well-known example of these structures is the Wireless Sensor Network (WSN).
Bassam W. Aboshosha +2 more
doaj +1 more source
Energy Optimization on Symmetric Key Encryption and Decryption Algorithm using Genetic Algorithm
In this paper we have proposed energy optimization on symmetric key encryption and decryption algorithm are using genetic algorithm where we have used symmetric key for encryption & decryption algorithm that optimize the energy in terms of power consumption related to the laptop battery.
Ratnesh Mishra +3 more
openaire +1 more source
Unlocking Photodetection Mode Switching from a Simple Lateral Design
A simple lateral 2D perovskite photodetector capable of switching among transient, continuous, and dual transient/continuous photoresponse modes is achieved by integrating photoconductive effects with capacitive coupling from the SiO2/Si substrate. Such light‐programmable photodetection mode switching enables triple‐channel information transmission and
Zijun (June) Yong +10 more
wiley +1 more source
Depth-Optimized Quantum Circuits for ASCON: AEAD and HASH
Quantum computing advancements pose security challenges for cryptography. Specifically, Grover’s search algorithm affects the reduction in the search complexity of symmetric-key encryption and hash functions. Recent efforts have been made to estimate the
Yujin Oh +3 more
doaj +1 more source
A Non‐Reciprocal Architected Porous Medium
ABSTRACT In several fluid flow, energy‐dumping, and energy‐harvesting applications, a dominant flow direction or dominant resistance direction is desirable. In this study, we propose a simple modular geometry that doubles flow resistance in one direction relative to the opposite direction, while maintaining laminar viscous flow.
Clément Vezies +2 more
wiley +1 more source
Cryptographic Complexity Analysis and Testing of the Symmetric Block Algorithm WBC2
Introduction. Modern developments in the field of block-oriented algorithms are aimed at improving performance, reducing computational costs, and integrating such algorithms into quantum-resistant national standards.
Igor Baranov
doaj +1 more source
A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts
In a white-box context, an adversary has total visibility of the implementation of the cryptosystem and full control over its execution platform. As a countermeasure against the threat of key compromise in this context, a new secure implementation of the
Yang Shi, Qin Liu, Qinpei Zhao
doaj +1 more source
Wafer‐scale two‐dimensioanl In2Se3 oxidized into InOx on sodium‐embedded beta‐alumina enables multifunctional reconfigurable electronics. Sodium ions accumulate within distinct spatial distribution under drain‐controlle and gate‐controlled operation. Drain‐control operation gives controllability of ultraviolet‐driven optoelectronic synaptic conductance
Jinhong Min +13 more
wiley +1 more source
Due to the unified protocol specification, encryption, and firewalls and other security measures at present, communication within the network environment are in good usability and security in heterogeneous network environment.
Yingying Chen +5 more
doaj +2 more sources
Field‐free spin‐orbit torque domain‐wall synapses integrated with stochastic MTJ neurons enable compact hardware Boltzmann machines. Leveraging intrinsic stochasticity and multi‐level conductance, the system achieves efficient probabilistic learning with high accuracy, demonstrating a scalable spintronic platform for energy‐efficient edge AI.
Aijaz H. Lone +8 more
wiley +1 more source

