Results 111 to 120 of about 49,036 (287)
Symmetric Cryptography (Dagstuhl Seminar 22141)
Contains fulltext : 286012.pdf (Publisher’s version ) (Open Access)
Leander, N.G. +3 more
openaire +2 more sources
Wound closure is governed by geometry‐orientation coupling: aligned fibers speed migration along their axis but hinder perpendicular advance. In vivo diabetic wound experiments with composition‐matched fibrin, combined with an anisotropic diffusion (biased random‐walk) model, quantify this trade‐off and generate a healing landscape.
Yin‐Yuan Huang +13 more
wiley +1 more source
Symmetric Block Algorithm WBC1 and Analysis of Its Implementation Complexity
Introduction. Nowadays, computer networks are gaining more and more importance for information exchange. Cryptography plays a vital role in the security of computing, mobile phone communication, passwords in computing and even engineering, unlike in the ...
Igor Baranov
doaj +1 more source
09031 Abstracts Collection – Symmetric Cryptography
From 11.01.09 to 16.01.09, the Seminar 09031 in ``Symmetric Cryptography '' was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed.
Handschuh, Helena +3 more
openaire +3 more sources
Potato virus X is a filamentous RNA plant virus that can be engineered into a molecular tool for cancer therapy. We produced genetically‐encoded virus‐derived nanoparticles decorated with nanobodies targeting cancer cell receptors, epidermal growth factor receptor (EGFR) and human epidermal growth factor 2 (HER2).
Enrique Lozano‐Sanchez +4 more
wiley +1 more source
Depth-Optimized Quantum Circuits for ASCON: AEAD and HASH
Quantum computing advancements pose security challenges for cryptography. Specifically, Grover’s search algorithm affects the reduction in the search complexity of symmetric-key encryption and hash functions. Recent efforts have been made to estimate the
Yujin Oh +3 more
doaj +1 more source
Authenticated tree parity machine key exchange
The synchronisation of Tree Parity Machines (TPMs), has proven to provide a valuable alternative concept for secure symmetric key exchange. Yet, from a cryptographer's point of view, authentication is at least as important as a secure exchange of keys ...
Schaumburg, André, Volkmer, Markus
core
Strain Engineering of Magnetoresistance and Magnetic Anisotropy in CrSBr
Biaxial compressive strain significantly enhances magnetoresistance and critical saturation fields in thin flakes of the 2D magnet CrSBr, along all three crystallographic axes. First‐principles calculations link these effects to strain‐induced increases in exchange interactions and magnetic anisotropy.
Eudomar Henríquez‐Guerra +19 more
wiley +1 more source
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll +19 more
wiley +1 more source
The seminal transformation of a 2D‐COF (SURFCOF‐IMDEA1) into a 2D porous COF (SURFCOF‐IMDEA2) on Au(111) by a sequential C‐C coupling and ladderization triggered by thermal annealing steps at increasing temperatures is reported. Abstract The development of covalent organic frameworks (COFs) is currently a primary objective in materials science, taking ...
Ana Barragán +11 more
wiley +1 more source

