Zobrazeno 1 - 10
of 1 764
pro vyhledávání: '"Hwajeong"'
Publikováno v:
Applied Sciences, Vol 14, Iss 19, p 8579 (2024)
Quantum computers have the capacity to solve certain complex problems more efficiently than classical computers. To fully leverage these quantum advantages, adapting classical arithmetic for quantum systems in a circuit level is essential. In this pa
Externí odkaz:
https://doaj.org/article/b94346b6a324428b90e755f833367c81
Publikováno v:
Applied Sciences, Vol 14, Iss 19, p 8647 (2024)
This study proposes an optimized implementation of the HAWK Signature algorithm, one of the candidates in the first evaluation round for additional digital signature schemes in the NIST Post-Quantum Cryptography competition. The core motivation of th
Externí odkaz:
https://doaj.org/article/dc4e4d7d76f448b389b350e198390971
Publikováno v:
Applied Sciences, Vol 14, Iss 18, p 8394 (2024)
The advancements in quantum computing and the potential for polynomial-time solutions to traditional public key cryptography (i.e., Rivest–Shamir–Adleman (RSA) and elliptic-curve cryptography (ECC)) using Shor’s algorithm pose a serious threat
Externí odkaz:
https://doaj.org/article/aef9762b91a045daa95208c2a2eaf8a7
Autor:
Ralf-Peter Czekay, Craig E. Higgins, Hasan Basri Aydin, Rohan Samarakoon, Nusret Bekir Subasi, Stephen P. Higgins, Hwajeong Lee, Paul J. Higgins
Publikováno v:
Cells, Vol 13, Iss 10, p 796 (2024)
A heterogenous population of inflammatory elements, other immune and nonimmune cells and cancer-associated fibroblasts (CAFs) are evident in solid malignancies where they coexist with the growing tumor mass. In highly desmoplastic malignancies, CAFs
Externí odkaz:
https://doaj.org/article/3364fa0309614b398c5065f0a181f295
Publikováno v:
Mathematics, Vol 12, Iss 9, p 1337 (2024)
Quantum computing advancements pose security challenges for cryptography. Specifically, Grover’s search algorithm affects the reduction in the search complexity of symmetric-key encryption and hash functions. Recent efforts have been made to estima
Externí odkaz:
https://doaj.org/article/7281c7133d5240e78984d405f192280a
Autor:
Juhyeong Kim, Junho Lee, Hwajeong Ryu, Yoon Hwa, Aneel Pervez, Taeyong Choi, Suyong Nam, Yoonkook Son
Publikováno v:
Applied Sciences, Vol 14, Iss 7, p 2977 (2024)
In this study, we investigate the electrochemical properties of a nickel oxide-carbon (NiO/C) material, synthesized in the form of highly porous carbon nanofibers through the electrospinning of polymers such as polyacrylonitrile (PAN) and polystyrene
Externí odkaz:
https://doaj.org/article/a2b10ca1a6104a22a8f5a2424161b344
Autor:
Attila Molnar, Hunter Monroe, Hasan Basri Aydin, Mustafa Erdem Arslan, Andrea Lightle, Hwajeong Lee, Tony El Jabbour
Publikováno v:
Current Oncology, Vol 30, Iss 2, Pp 2388-2404 (2023)
Immunotherapy has remained at the vanguard of promising cancer therapeutic regimens due to its exceptionally high specificity for tumor cells and potential for significantly improved treatment-associated quality of life compared to other therapeutic
Externí odkaz:
https://doaj.org/article/2cfa81f3f999496b989fec961ac44b09
Publikováno v:
IEEE Access, Vol 11, Pp 54175-54187 (2023)
Machine Learning (ML) is almost ubiquitously used in multiple disciplines nowadays. Recently, we have seen its usage in the realm of differential distinguishers for symmetric key ciphers. It has been shown that ML-based differential distinguishers ca
Externí odkaz:
https://doaj.org/article/8835f2ecc6d1456c9188a6a9cc8e996a
Publikováno v:
Advanced Energy & Sustainability Research, Vol 4, Iss 9, Pp n/a-n/a (2023)
Herein, the thermoelectric characteristics of polytriarylamine‐Lewis acid complex films were investigated by employing a horizontal device structure. Poly[N,N′‐bis(4‐butylphenyl)‐N,N′‐bis(phenyl)benzidine] (PolyTPD) is doped with tris(p
Externí odkaz:
https://doaj.org/article/bc341bfbfade445f8d52d37f66446f63
Publikováno v:
Applied Sciences, Vol 14, Iss 7, p 2824 (2024)
Security vulnerabilities in the symmetric-key primitives of a cipher can undermine the overall security claims of the cipher. With the rapid advancement of quantum computing in recent years, there is an increasing effort to evaluate the security of s
Externí odkaz:
https://doaj.org/article/9389d7cb972443d29abc7722d30497bb