Results 71 to 80 of about 807,165 (362)

Investigation of Iron‐Aluminide‐Like Phase Composition in Complex Concentrated Fe32Cu12Ni11Ti16Al29 Alloy

open access: yesAdvanced Engineering Materials, EarlyView.
This work reveals the phase composition and quantitative morphology analysis of precipitation‐hardened Fe32Cu12Ni11Ti16Al29 complex‐concentrated alloy. The precipitates are shown to have a high coherency. Morphology transition between sphere, cuboidal, and elongated morphology is observed. Finally, the overaging behavior is captured using microhardness.
Rostyslav Nizinkovskyi   +4 more
wiley   +1 more source

Comprehensive Analysis of Cryptographic Algorithms: Implementation and Security Insights

open access: yesEngineering Proceedings
This study surveys some cryptographic algorithms in a detailed manner; it mainly focuses on symmetric key cryptography and asymmetric key cryptography with hash functions following them.
Rashid Muhenga   +4 more
doaj   +1 more source

Symmetric Cryptography on RISC-V: Performance Evaluation of Standardized Algorithms

open access: yesCryptography, 2022
The ever-increasing need for securing computing systems using cryptographic algorithms is spurring interest in the efficient implementation of common algorithms.
Görkem Nişancı   +2 more
doaj   +1 more source

Quantum cryptography: a practical information security perspective [PDF]

open access: yes, 2009
Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic ...
Paterson, Kenneth G.   +2 more
core   +1 more source

(Nb,Ti)(C,N)‐Precipitates in High‐Strength Low‐Alloyed Steels—Modeling, Characterization and Validation

open access: yesAdvanced Engineering Materials, EarlyView.
Steel samples are investigated using complementary simulations and measurements. Transmission electron microscopy in bright‐field mode, combined with energy‐dispersive X‐ray spectroscopy maps for titanium and niobium, reveals distinct particle populations. Simulations reproduce these in size and composition.
Marc Laub   +3 more
wiley   +1 more source

Removing Homocoupling Defects in Alkoxy/Alkyl‐PBTTT Enhances Polymer:Fullerene Co‐Crystal Formation and Stability

open access: yesAdvanced Functional Materials, EarlyView.
PBTTT‐OR‐R, a C14‐alkoxy/alkyl‐PBTTT polymer derivative, is of substantial interest for optoelectronics due to its specific fullerene intercalation behavior and enhanced charge‐transfer absorption. Comparing this polymer with (S) and without (O) homocoupling defects reveals that PBTTT‐OR‐R(O) forms stable co‐crystals with PC61BM, while PBTTT‐OR‐R(S ...
Zhen Liu   +14 more
wiley   +1 more source

Exploring Integrity of AEADs with Faults: Definitions and Constructions

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Implementation-based attacks are major concerns for modern cryptography. For symmetric-key cryptography, a significant amount of exploration has taken place in this regard for primitives such as block ciphers.
Sayandeep Saha   +2 more
doaj   +1 more source

A Symmetric Cryptography Algorithm in Wireless Sensor Network Security

open access: yesInternational Journal of Online Engineering (iJOE), 2017
In order to study the symmetric cryptography algorithm, which plays an essential role in ensuring the information security, AES (Advanced Encryption Standard) basic theory is discussed, and AES protocol processor for a small area based on wireless sensor
Juan Li
semanticscholar   +1 more source

Exploring Dipolar Dynamics and Ionic Transport in Metal‐Organic Frameworks: Experimental and Theoretical Insights

open access: yesAdvanced Functional Materials, EarlyView.
In this study, the interplay of dipolar dynamics and ionic charge transport in MOF compounds is investigated. Synthesizing the novel structure CFA‐25 with integrated freely rotating dipolar groups, local and macroscopic effects, including interactions with Cs cations are explored.
Ralph Freund   +6 more
wiley   +1 more source

Cryptography: Symmetric Vs Asymmetric Encryption

open access: yes, 2018
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social media, online transaction, application and business, organization across the globe produce too much amount of data every second. Data Security is the most basic and extreme measures to ensure secure passage of information through internet.
Gaurav   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy