Results 121 to 130 of about 807,165 (362)
Reducing quantum resources for attacking S-AES on quantum devices
The Advanced Encryption Standard (AES) is one of the most widely used symmetric block cipher cryptography algorithms. Simplified-AES (S-AES) retains the structural framework of AES, making it an ideal model for elucidating the mechanism of symmetric ...
Zeguo Wang +5 more
doaj +1 more source
This study demonstrated single‐crystalline PbTiO3‐based memristors with atomically sharp interfaces, well‐ordered lattices, and minimal lattice mismatch. The devices exhibited an ON/OFF ratio exceeding 105, high stability, and rich resistance‐state modulation.
Haining Li +7 more
wiley +1 more source
Performance of Practical Quantum Oblivious Key Distribution
Motivated by the applications of secure multi-party computation as a privacy-protecting data analysis tool, and identifying oblivious transfer as one of its main practical enablers, we propose a practical realization of randomized quantum oblivious ...
Mariano Lemus +7 more
doaj +1 more source
Trust-by-Design – Strong Security Arguments for Symmetric Key Cryptography [PDF]
openalex +1 more source
Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review
Unmanned Aerial Vehicles (UAVs), commonly known as drones, are increasingly being employed across a broad spectrum of applications, ranging from military operations to commercial purposes.
Muhammad Asghar Khan +4 more
semanticscholar +1 more source
This study demonstrates that pulsed potential electrolysis significantly improves CO2 reduction performance on copper‐nitrogen doped carbon electrodes. The formation of cationic copper sites and metallic clusters as a function of applied intermittent potential leads to notable selectivity changes compared to potentiostatic reduction.
Dorottya Hursán +13 more
wiley +1 more source
A Generic Security API for Symmetric Key Management on Cryptographic Devices [PDF]
Véronique Cortier, Graham Steel
openalex +1 more source
A novel package of key generation and integrity validation in symmetric key cryptography [PDF]
Scott E. Vinay, Kumar Siddamallappa U
openalex +1 more source
09031 Executive Summary – Symmetric Cryptography
Research in Symmetric Cryptography is quickly evolving. The seminar was the second of its kind, the first one took place in 2007. We observe a steadily increasing interest in Symmetric Cryptography, as well as a growing practical demand for symmetric algorithms and protocols.
Handschuh, Helena +3 more
openaire +3 more sources
Particular thermal metamaterials are widely used as daytime radiative coolers merely by embedding thermally emissive nanoparticles (NPs) in liquid resins to form scalable, yet highly efficient cooling films in a cost‐effective way. However, randomly dispersed NPs, prevalently used thus far, cause strong scattering, limiting NP content and cooling ...
YongDeok Cho +10 more
wiley +1 more source

