Results 221 to 230 of about 3,519 (307)
Can Symmetric Cryptography Be Liberated from the Von Neumann Style?
Jean-Baptiste Menant +2 more
openalex +1 more source
09031 Executive Summary – Symmetric Cryptography
Helena Handschuh +3 more
openalex +2 more sources
Pattern Formation in Non‐Equilibrium Architected Materials
This article demonstrates an artificial mechanical system ‐ a robotic metamaterial ‐ as an accessible and versatile platform within which to explore and prescribe the reaction‐diffusion driven pattern formation hitherto associated with comparatively less accessible and versatile non‐equilibrium biological and chemical systems.
Vinod Ramakrishnan, Michael J. Frazier
wiley +1 more source
Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification. [PDF]
Hao J, Jin M, Li Y, Yang Y.
europepmc +1 more source
Text and Image Encryption Using Symmetric Cryptography Ron Rivest Cipher 2 (RC2)
Saniya Rahma Pratiwi +2 more
openalex +2 more sources
Complementary unipolar electrical transport is demonstrated in ZnO‐Co3O4 core–shell nanowires, by engineering multi‐terminal device architectures that allow to selectively address different sections of the nanostructure and resorting on ionic liquid gating for conformal capacitive coupling and field effect control.
Valeria Demontis +5 more
wiley +1 more source
Quantum secure direct communication: whispering with photons. [PDF]
Wang M, Long GL.
europepmc +1 more source
IMPLEMENTATION OF SYMMETRIC CRYPTOGRAPHY IN EMBEDDED MEASUREMENT SYSTEMS
W. Winiecki, Piotr Bilski
openalex +2 more sources
Multiscale Acoustic Bubble Actuators Using Bioinspired Liquid‐Repellent Microstructures
The article presents multiscale acoustic bubble actuators using bioinspired liquid‐repellent microstructures, enabling programmable trapping, pumping, mixing, and precise flow control. Mimicking springtail microstructures, these scalable actuators (200 µm–1 mm) offer multifunctionality in all‐in‐one devices, letter‐shaped arrays, and 3D cube ...
Cem Balda Dayan +8 more
wiley +1 more source
A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. [PDF]
Aquina N +9 more
europepmc +1 more source

