Filters








110 Hits in 4.1 sec

Fast Lattice-Based Encryption: Stretching Spring [chapter]

Charles Bouillaguet, Claire Delaplace, Pierre-Alain Fouque, Paul Kirchner
2017 Lecture Notes in Computer Science  
However, there is no such chain of reductions relating SPRING to lattice problems, because it uses small parameters for efficiency reasons.  ...  It is quite fast, only 4.5 times slower than the AES (without hardware acceleration) when used in counter mode.  ...  We think that lattice-based cryptography can be used with high performance.  ... 
doi:10.1007/978-3-319-59879-6_8 fatcat:z5plchfuh5gg3a2ie65l6gwzly

Free-standing nanoparticle superlattice sheets: From design to applications

Wenlong Cheng
2017 Europhysics letters  
In addition, diverse types of lattice structures have been found including face-centered cubic, body-centered cubic, hexagonal closed-packed, diamond-like lattice, and lattice structures not existing in  ...  When the lattice is stretched, interparticle spacing may increase, reducing plasmonic coupling, hence, causing spectral shift. This attribute may be used for strain gauge sensing applications.  ...  For the linear region, bending stiffness or spring constant can be obtained. At larger indentations, nonlinear behavior is generally observed.  ... 
doi:10.1209/0295-5075/119/48004 fatcat:qvxfemr2gfcnfnv4qi4rsjhre4

Post-Quantum Cryptography [chapter]

Qijun Gu, Pascal Paillier, Tanja Lange, Edlyn Teske, Darrel Hankerson, Alfred Menezes, David Zhang, Feng Yue, Wangmeng Zuo, Jean-Jacques Quisquater, Gildas Avoine, Gerald Brose (+73 others)
2011 Encyclopedia of Cryptography and Security  
Acknowledgements We thank Phong Nguyen and Markus Rückert for helpful discussions on the practical security of lattice-based cryptography.  ...  Not broken yet NTRU public key encryption Not broken yet Lattice-based public key encryption Not broken yet Table 1 .  ...  Public Key Encryption Schemes Several methods have been proposed to build public key encryption schemes based on the hardness of lattice problems.  ... 
doi:10.1007/978-1-4419-5906-5_386 fatcat:ucdkilta7zc3voq7nqctmjkcr4

Cryptography in a Quantum World [article]

Gilles Brassard
2015 arXiv   pre-print
More recent approaches based on hash functions, short vectors in lattices and multivariate polynomials are being vigorously investigated.  ...  Well, in the case of lattice-based cryptography [35] , this is not so clear anymore [36, 37, 38] . But one thing is sure: we cannot hope to be protected by these techniques if we don't use them!  ... 
arXiv:1510.04256v1 fatcat:vbalvrubfng2pk4lj57zkfcnzm

Kirigami‐inspired Biodesign for Applications in Healthcare

Anne Katherine Brooks, Sudesna Chakravarty, Maryam Ali, Vamsi K Yadavalli
2022 Advanced Materials  
Kirigami-based approaches have been used for device design in areas ranging from soft bioelectronics to energy storage.  ...  ; the thickness was linearly related to the spring constant.  ...  By decreasing the spring constant of the polyimide to match PDMS, the geometric pattern was optimized.  ... 
doi:10.1002/adma.202109550 pmid:35073433 fatcat:4cvdchtkovdlxed2r6dry55sey

Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture

Dr. Sai Manoj Kudavaralli
2021 Zenodo  
Leveraging Predicate Based Encryption.  ...  The network will stream the data and provide fast access to clients based on internet speed. In 2014 Afnan Ullah Khan wrote a proposal that Confidential data access method.  ... 
doi:10.5281/zenodo.5148421 fatcat:lzanqvxdlre2dh3hdhjxibdrim

Mechano-tunable chiral metasurfaces via colloidal assembly

Patrick T. Probst, Martin Mayer, Vaibhav Gupta, Anja Maria Steiner, Ziwei Zhou, Günter K. Auernhammer, Tobias A. F. König, Andreas Fery
2021 Nature Materials  
For stretching, periodicities of the lattice in both the directions were increased based on the tabulated Poisson's ratio. All simulations reached an auto-shutoff of at least 10 -7 .  ...  lattice with lattice constant 𝑎𝑎 = 420 nm. c, Mean value and standard deviation in SLR peak positions are shown for the relaxed and 15% stretched case.  ...  One hundred stretching cycles demonstrate a reversible transformation from a square to a rectangular lattice, accompanied by polarization-dependent optical properties.  ... 
doi:10.1038/s41563-021-00991-8 pmid:33927391 fatcat:dkrud6jvtncqrmq32rlddqj5eu

Simulation of Laser Thermal Interaction with Titanium Dioxide /Polyvinyl Alcohol Nanocomposite Thin Films

A.M. Shehap, Dana.S. Akil
2015 International Journal of Science and Engineering Applications  
The system was developed based on a proposed secure RFB protocol with self-signed Secure Socket Layer (SSL) certificate incorporated into this RFB protocol to ensure endto-end encrypted connections between  ...  The app was developed based on the Remote Frame Buffer (RFB) protocol.  ...  CONCLUSIONS Based on the experimental result, it prooves that the website of this research can be used to give the information of routes, maps, varying types of bemo lines using any size of  ... 
doi:10.7753/ijsea0404.1001 fatcat:2fr7pbjz5ngsplez7cvthiht5e

Bioinspired Bouligand cellulose nanocrystal composites: a review of mechanical properties

Bharath Natarajan, Jeffrey W. Gilman
2017 Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences  
Polarized optical microscopy and SEM images of (c,g) fast-dried, sodiumneutralized, (d,h) slow-dried, sodium-neutralized, (e,i) fast-dried, methyltriphenylphosphonium-neutralized, and (f,j) slowdried,  ...  The micellar structure of the surfactant was hypothesized to act as a spring that enhanced film flexibility [72] . Similarly, Liu et al.  ... 
doi:10.1098/rsta.2017.0050 pmid:29277746 fatcat:qlddqnrngfhspfs34wxxvbl7fq

Bespoke Physics for Living Technology

David H. Ackley
2013 Artificial Life  
The Movable Feast Machine is a lattice molecular system and its physics is clearly related to influential early lattice models such as the autopoeisis model [36] (with its important later corrections  ...  It is distressing that the highest impact lifelike computational objects today-though not springing from overtly alife research-are the computer viruses and other digital vermin of the internet.  ... 
doi:10.1162/artl_a_00117 pmid:23889741 fatcat:jh7ryfnjandihl6wuvuq7zpyde

Black hole evolution

Lárus Thorlacius
1995 Nuclear Physics B - Proceedings Supplements  
Based on lectures given at the 1994 Trieste Spring School  ...  This work was described in detail in the lectures of Banks at this Spring School.  ...  The estimate is based on some general results found by Page [58] on the entanglement entropy of subsystems in statistical mechanics.  ... 
doi:10.1016/0920-5632(95)00435-c fatcat:ferxwcte65gozftekyeks6mpqm

Spatial networks

Marc Barthélemy
2011 Physics reports  
In particular, areas with small bottlenecks may be very sensitive to the local density of encrypted routers.  ...  In [198] the authors study the percolation on a model of lattice-based scale-free network where each node is connected to all the neighbors in a radius R distributed according to a law P(R) ∼ R −β ,  ... 
doi:10.1016/j.physrep.2010.11.002 fatcat:mp77spbw2jewvijlttu7y3bktq

Active and tunable nanophotonic metamaterials

Kebin Fan, Richard D. Averitt, Willie J. Padilla
2022 Nanophotonics  
Instead of directly using mechanical forces to stretch the substrate, the DEA works as a compliant parallel plate capacitor, which stretches under a large electric field.  ...  The top conductor (gold) is mounted to a nonconductive platform (gray), both of which are movable, where the springs provide a restoring force.  ... 
doi:10.1515/nanoph-2022-0188 fatcat:yfgog3g545c5thrwvpqzncazia

Accelerated Streak Line Computation Using Adaptive Refinement

Alexander Wiebel, Qin Wang, Dominic Schneider, Gerik Scheuermann
2010 Journal of WSCG  
BASIC DEFINITIONS AND NOTA-TIONS We use the Cartesian point lattice Z Cartesian lattice we define the local neighborhood of size k for lattice points by N k (p) = q ∈ Z 2 : max (|p x − q x |, |p y − q  ...  [Sav04] encrypted the training images which are used to synthesise the correlation filter for biometrics authentication.  ...  Simulating Real-Time Cloth with Adaptive Edge-based A new CBIR approach based on relevance and Automated Motion LoD with Rigid Constraints ABSTRACT Motion LoD (Level of Detail) is a preprocessing  ... 
dblp:journals/jwscg/WiebelWSS10 fatcat:7oansbyi4zcfli6shsmt5blcvi

Editorial advisory board members [chapter]

2008 Progress in Heterocyclic Chemistry  
For unconditional stability, implicit integration could be used as demonstrated for the GPU-based deformation by Tejada et al. [TE05] . The mass spring models are fast but inaccurate.  ...  A CUDA-based mass spring model has been proposed recently [ADLETG10].  ... 
doi:10.1016/s0959-6380(08)80002-5 fatcat:iqgyohmpjrdhfdj3d6o6vkvkuu
« Previous Showing results 1 — 15 out of 110 results