Results 81 to 90 of about 49,036 (287)

Poly-alphabetic Symmetric Key Algorithm Using Randomized Prime Numbers [PDF]

open access: yes
- Cryptography is an art and science. It is a playing major role in information and security division. The main aim of the cryptography is protecting the data from unauthorized users or hackers.
Ch. Santhosh Reddy   +3 more
core  

Group theory in cryptography [PDF]

open access: yes, 2010
This paper is a guide for the pure mathematician who would like to know more about cryptography based on group theory. The paper gives a brief overview of the subject, and provides pointers to good textbooks, key research papers and recent survey papers ...
Blackburn, Simon R.   +2 more
core  

Security of Quantum Key Distribution

open access: yes, 2016
The security issues facing quantum key distribution (QKD) are explained, herein focusing on those issues that are cryptographic and information theoretic in nature and not those based on physics. The problem of security criteria is addressed.
Yuen, Horace
core   +1 more source

Intermolecular Interactions as Driving Force of Increasing Multiphoton Absorption in a Perylene Diimide‐Based Coordination Polymer

open access: yesAdvanced Functional Materials, EarlyView.
This study uncovers the unexplored role of intermolecular interactions in multiphoton absorption in coordination polymers. By analyzing [Zn2tpda(DMA)2(DMF)0.3], it shows how the electronic coupling of the chromophores and confinement in the MOF enhance two‐and three‐photon absorption.
Simon Nicolas Deger   +11 more
wiley   +1 more source

Postquantum symmetric cryptography inspired by neural networks [PDF]

open access: yesAnnals of computer science and information systems, 2023
Wojciech Węgrzynek, Paweł Topa
doaj   +1 more source

Band Alignment in In‐Oxo Metal Porphyrin SURMOF Heterojunctions

open access: yesAdvanced Functional Materials, EarlyView.
Porphyrin core metalation in indium‑oxo SURMOFs enables systematic tuning of band edge positions without altering the crystal structure. First‑principles calculations reveal type‑I and type‑II heterostructures as well as multi‑junction energy cascades, establishing a modular strategy for exciton funneling and charge separation in optoelectronic ...
Puja Singhvi, Nina Vankova, Thomas Heine
wiley   +1 more source

Optimizations in Symmetric Cryptography [PDF]

open access: yes, 2022
Radboud University, 01 juni ...
openaire  

Emergent Spin‐Glass Behavior in an Iron(II)‐Based Metal–Organic Framework Glass

open access: yesAdvanced Functional Materials, EarlyView.
A one‐pot, solvent‐free synthesis yields an Fe2+‐based metal‐organic framework (MOF) glass featuring a continuous random network structure. The material exhibits spin‐glass freezing at 14 K, driven by topological‐disorder and short‐range magnetic frustration, showcasing the potential of MOF glasses as a plattform for cooperative magnetic phenomena in ...
Chinmoy Das   +8 more
wiley   +1 more source

Analysis of Elliptic Curve Cryptography (ECC) for Energy Efficiency in Wireless Sensor Networks

open access: yesNUST Journal of Engineering Sciences, 2009
Rapid growth of wireless sensor networks (WSN) in recent times has resulted in greater security requirements. One of the primary concerns in wireless sensor networks is energy efficiency and security mechanisms are no different.
Zain Ul Abideen Tariq   +2 more
doaj   +1 more source

Predicting Atomic Charges in MOFs by Topological Charge Equilibration

open access: yesAdvanced Functional Materials, EarlyView.
An atomic charge prediction method is presented that is able to accurately reproduce ab‐initio‐derived reference charges for a large number of metal–organic frameworks. Based on a topological charge equilibration scheme, static charges that fulfill overall neutrality are quickly generated.
Babak Farhadi Jahromi   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy