Results 91 to 100 of about 807,165 (362)

A New Method for Symmetric Key Cryptography

open access: yesInternational Journal of Computer Applications, 2016
In the age of Information Technology Information Security is very important. To provide the security to the communication data, we are using different encryption algorithms. Encryption algorithms can be categorized into Symmetric key cryptography and Asymmetric key cryptography. Many of the Symmetric encryption algorithms (DES, 3DES, Blowfish, RC6 etc…)
B. Nagaraju, P. Ramkumar
openaire   +2 more sources

Applications of tripled chaotic maps in cryptography

open access: yes, 2007
Security of information has become a major issue during the last decades. New algorithms based on chaotic maps were suggested for protection of different types of multimedia data, especially digital images and videos in this period. However, many of them
A. Akhavan   +48 more
core   +1 more source

Synchrotron Radiation for Quantum Technology

open access: yesAdvanced Functional Materials, EarlyView.
Materials and interfaces underpin quantum technologies, with synchrotron and FEL methods key to understanding and optimizing them. Advances span superconducting and semiconducting qubits, 2D materials, and topological systems, where strain, defects, and interfaces govern performance.
Oliver Rader   +10 more
wiley   +1 more source

О возможностях использования арифметики Фибоначчи для повышения эффективности криптографических преобразований [PDF]

open access: yes, 2005
Abvisability of application the arithmetic of Fibonacci to cryptography is consider in the article. Perspective of this direction to improvement of the statistical properties of symmetric cryptography transformation is describe.В статье рассматривается ...
Уфимцева, Виктория
core  

Fractional Skyrmion Tubes in Chiral‐Interfaced 3D Magnetic Nanowires

open access: yesAdvanced Functional Materials, EarlyView.
In chiral 3D helical magnetic nanowires, the coupling between the geometric and magnetic chirality provides a way to create topological spin states like vortex tubes. Here, it is demonstrated how the breaking of this coupling in interfaced 3D nanowires of opposite chirality leads to even more complex topological spin states, such as fractional ...
John Fullerton   +11 more
wiley   +1 more source

On the Security Goals of White-Box Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
We discuss existing and new security notions for white-box cryptography and comment on their suitability for Digital Rights Management and Mobile Payment Applications, the two prevalent use-cases of white-box cryptography.
Estuardo Alpirez Bock   +3 more
doaj   +1 more source

Soft and Stiff 3D Microstructures by Step‐Growth Photopolymerization Using a Single Photoresin and Multi‐Photon Laser Printing

open access: yesAdvanced Functional Materials, EarlyView.
An additive and initiator‐free photoresin based on a prepolymer decorated with photoreactive step‐growth units as crosslinkers allows for the fabrication of 3D microstructures with strongly disparate mechanical properties ranging from stiff to soft. Abstract Manufacturing three‐dimensional (3D) microstructures with multi‐material properties via two ...
Tugce Nur Eren   +7 more
wiley   +1 more source

Copper‐based Materials for Photo and Electrocatalytic Process: Advancing Renewable Energy and Environmental Applications

open access: yesAdvanced Functional Materials, EarlyView.
Cu‐based catalysts as a cornerstone in advancing sustainable energy technologies are fully reviewed in this manuscript, highlighting their potential in photo‐ and electrocatalysis. It includes metallic copper, copper oxides, copper sulfides, copper halide perovskites, copper‐based metal–organic frameworks (MOFs), and covalent organic frameworks (COFs),
Jéssica C. de Almeida   +16 more
wiley   +1 more source

Postquantum symmetric cryptography inspired by neural networks [PDF]

open access: yesAnnals of computer science and information systems, 2023
Wojciech Węgrzynek, Paweł Topa
doaj   +1 more source

Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors [PDF]

open access: yes, 2015
Resource constraints in smart devices demand an efficient cryptosystem that allows for low power and memory consumption. This has led to popularity of comparatively efficient Elliptic curve cryptog-raphy (ECC).
Malik, Yasir
core   +1 more source

Home - About - Disclaimer - Privacy