Results 81 to 90 of about 807,165 (362)

Group theory in cryptography [PDF]

open access: yes, 2010
This paper is a guide for the pure mathematician who would like to know more about cryptography based on group theory. The paper gives a brief overview of the subject, and provides pointers to good textbooks, key research papers and recent survey papers ...
Blackburn, Simon R.   +2 more
core  

High‐Performance Low‐Emissivity Paints Enabled by N‐Doped Poly(benzodifurandione) (n‐PBDF) for Energy‐Efficient Buildings

open access: yesAdvanced Functional Materials, EarlyView.
This study introduces a scalable and colored low‐emissivity (low‐e) paint achieved by spraying an ultrathin n‐doped poly(benzodifurandione) (n‐PBDF) coating onto various colored substrates. The low‐e paint enhances thermal regulation by reducing mid‐infrared thermal emissivity to 0.19, thereby stabilizing indoor temperatures across diverse climates ...
Xiaojie Liu   +13 more
wiley   +1 more source

Security of Quantum Key Distribution

open access: yes, 2016
The security issues facing quantum key distribution (QKD) are explained, herein focusing on those issues that are cryptographic and information theoretic in nature and not those based on physics. The problem of security criteria is addressed.
Yuen, Horace
core   +1 more source

Enhancing Optoelectronic Properties in Phthalocyanine‐Based SURMOFs: Synthesis of ABAB Linkers by Avoiding Statistical Condensation with Tailored Building Blocks

open access: yesAdvanced Functional Materials, EarlyView.
A novel phthalocyanine (PC)‐based metal–organic framework (MOFs) is synthesized using ditopic PC linkers obtained through regioselective statistical condensation. The resulting MOF exhibits significant improvements in electronic absorption, thereby enhancing the material's performance in light harvesting and energy conversion.
Lukas S. Langer   +12 more
wiley   +1 more source

AUDIO CRYPTANALYSIS- AN APPLICATION OF SYMMETRIC KEY CRYPTOGRAPHY AND AUDIO STEGANOGRAPHY

open access: yesICTACT Journal on Communication Technology, 2016
In the recent trend of network and technology, “Cryptography” and “Steganography” have emerged out as the essential elements of providing network security. Although Cryptography plays a major role in the fabrication and modification of the secret message
Smita Paira, Sourabh Chandra
doaj  

Intermolecular Interactions as Driving Force of Increasing Multiphoton Absorption in a Perylene Diimide‐Based Coordination Polymer

open access: yesAdvanced Functional Materials, EarlyView.
This study uncovers the unexplored role of intermolecular interactions in multiphoton absorption in coordination polymers. By analyzing [Zn2tpda(DMA)2(DMF)0.3], it shows how the electronic coupling of the chromophores and confinement in the MOF enhance two‐and three‐photon absorption.
Simon Nicolas Deger   +11 more
wiley   +1 more source

Ab Initio Study on 3D Anisotropic Ferroelectric Switching Mechanism and Coercive Field in HfO2 and ZrO2

open access: yesAdvanced Functional Materials, EarlyView.
This study uncovers a new switching mechanism in HfO2 and ZrO2, where the absence of a non‐polar layer along the a‐direction induces interaction between polar layers. Consequently, the switching barriers for growth are lower than those for nucleation in this direction, leading to a size‐dependent coercive field that matches experimental observations ...
Kun Hee Ye   +6 more
wiley   +1 more source

Which Chromium–Sulfur Compounds Exist as 2D Material?

open access: yesAdvanced Functional Materials, EarlyView.
2D chromium sulfides synthesized using molecular beam epitaxy on graphene. Structural characterization reveals two novel 2D materials, Cr2S3‐2D, which lacks a direct bulk counterpart, and Cr223S${\rm Cr}_{2\frac{2}{3}}{\rm S}$4‐2D, a minimum thickness version of Cr5S6. However, attempts to synthesize CrS2 are unsuccessful. Both new 2D phases are stable
Affan Safeer   +5 more
wiley   +1 more source

Symmetric Key Cryptography Algorithm for Data Security [PDF]

open access: yesInternational Journal of Trend in Scientific Research and Development, 2018
Ambiguous Multi Symmetric Cryptography AMSC that hide multiple plain texts in a cipher text using the same number of keys. The goal of this method is to overcome the problem of symmetric cryptography failure when the shared key is exposed. The proposed method AMSC is a cryptographic primitive that preserves plausible deniability after a cryptographic ...
Tushar Anil Patil   +1 more
openaire   +1 more source

Single Pair of Weyl Points Evolve From Spin Group‐Protected Nodal Line in Half‐Metallic Ferromagnet V3S4

open access: yesAdvanced Functional Materials, EarlyView.
A spin group (SG)‐based mechanism is proposed to realize a single pair of Weyl points. PT‐symmetric nodal lines (NLs) persist under T‐breaking, protected by the combination of SG and P symmetry. When considering spin‐orbit coupling, the SG‐protected NL will split into Weyl points, which will also induce anomalous transport phenomena arising from ...
Shifeng Qian   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy