Results 71 to 80 of about 807,165 (362)
This work reveals the phase composition and quantitative morphology analysis of precipitation‐hardened Fe32Cu12Ni11Ti16Al29 complex‐concentrated alloy. The precipitates are shown to have a high coherency. Morphology transition between sphere, cuboidal, and elongated morphology is observed. Finally, the overaging behavior is captured using microhardness.
Rostyslav Nizinkovskyi +4 more
wiley +1 more source
Comprehensive Analysis of Cryptographic Algorithms: Implementation and Security Insights
This study surveys some cryptographic algorithms in a detailed manner; it mainly focuses on symmetric key cryptography and asymmetric key cryptography with hash functions following them.
Rashid Muhenga +4 more
doaj +1 more source
Symmetric Cryptography on RISC-V: Performance Evaluation of Standardized Algorithms
The ever-increasing need for securing computing systems using cryptographic algorithms is spurring interest in the efficient implementation of common algorithms.
Görkem Nişancı +2 more
doaj +1 more source
Quantum cryptography: a practical information security perspective [PDF]
Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic ...
Paterson, Kenneth G. +2 more
core +1 more source
Steel samples are investigated using complementary simulations and measurements. Transmission electron microscopy in bright‐field mode, combined with energy‐dispersive X‐ray spectroscopy maps for titanium and niobium, reveals distinct particle populations. Simulations reproduce these in size and composition.
Marc Laub +3 more
wiley +1 more source
PBTTT‐OR‐R, a C14‐alkoxy/alkyl‐PBTTT polymer derivative, is of substantial interest for optoelectronics due to its specific fullerene intercalation behavior and enhanced charge‐transfer absorption. Comparing this polymer with (S) and without (O) homocoupling defects reveals that PBTTT‐OR‐R(O) forms stable co‐crystals with PC61BM, while PBTTT‐OR‐R(S ...
Zhen Liu +14 more
wiley +1 more source
Exploring Integrity of AEADs with Faults: Definitions and Constructions
Implementation-based attacks are major concerns for modern cryptography. For symmetric-key cryptography, a significant amount of exploration has taken place in this regard for primitives such as block ciphers.
Sayandeep Saha +2 more
doaj +1 more source
A Symmetric Cryptography Algorithm in Wireless Sensor Network Security
In order to study the symmetric cryptography algorithm, which plays an essential role in ensuring the information security, AES (Advanced Encryption Standard) basic theory is discussed, and AES protocol processor for a small area based on wireless sensor
Juan Li
semanticscholar +1 more source
In this study, the interplay of dipolar dynamics and ionic charge transport in MOF compounds is investigated. Synthesizing the novel structure CFA‐25 with integrated freely rotating dipolar groups, local and macroscopic effects, including interactions with Cs cations are explored.
Ralph Freund +6 more
wiley +1 more source
Cryptography: Symmetric Vs Asymmetric Encryption
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social media, online transaction, application and business, organization across the globe produce too much amount of data every second. Data Security is the most basic and extreme measures to ensure secure passage of information through internet.
Gaurav +3 more
openaire +2 more sources

