Nanotechnology for a sustainable future: Addressing global challenges with the international network4sustainable nanotechnology

L Pokrajac, A Abbas, W Chrzanowski, GM Dias… - 2021 - ACS Publications
Nanotechnology has important roles to play in international efforts in sustainability. We
discuss how current and future capabilities in nanotechnology align with and support the …

[HTML][HTML] Secret-free security: A survey and tutorial

U Rührmair - Journal of Cryptographic Engineering, 2022 - Springer
Abstract “Classical keys,” ie, secret keys stored permanently in digital form in nonvolatile
memory, appear indispensable in modern computer security—but also constitute an obvious …

Harnessing disorder for photonic device applications

H Cao, Y Eliezer - Applied Physics Reviews, 2022 - pubs.aip.org
For photonic devices, structural disorder and light scattering have long been considered
annoying and detrimental features that were best avoided or minimized. This review shows …

All-optical multilevel physical unclonable functions

S Nocentini, U Rührmair, M Barni, DS Wiersma… - Nature Materials, 2024 - nature.com
Disordered photonic structures are promising for the realization of physical unclonable
functions—physical objects that can overcome the limitations of conventional digital security …

Optical identification using physical unclonable functions

P Nadimi Goki, S Civelli, E Parente… - Journal of Optical …, 2023 - opg.optica.org
In this work, the concept of optical identification (OI) based on physical unclonable functions
is introduced for the first time, to our knowledge, in optical communication systems and …

[HTML][HTML] Quantum physical unclonable functions: Possibilities and impossibilities

M Arapinis, M Delavar, M Doosti, E Kashefi - Quantum, 2021 - quantum-journal.org
Abstract A Physical Unclonable Function (PUF) is a device with unique behaviour that is
hard to clone hence providing a secure fingerprint. A variety of PUF structures and PUF …

Security optimization of resource-constrained internet of healthcare things (IOHT) devices using asymmetric cryptography for blockchain network

V Jayaprakash, AK Tyagi - International Conference on Network Security …, 2021 - Springer
Abstract The term “Internet of Things” is becoming increasingly popular and promising,
ushering in a new era of smarter connectivity across billions of gadgets. In the foreseeable …

[HTML][HTML] Physical layer security in multimode fiber optical networks

S Rothe, N Koukourakis, H Radner, A Lonnstrom… - Scientific Reports, 2020 - nature.com
The light propagation through a multimode fiber is used to increase information security
during data transmission without the need for cryptographic approaches. The use of an …

Image scrambling adversarial autoencoder based on the asymmetric encryption

Z Bao, R Xue, Y Jin - Multimedia Tools and Applications, 2021 - Springer
For the purpose of information transmission security, image scrambling is to encrypt the
image by changing the image pixel values and pixel positions. Based on the asymmetric …

Cryptographic one-way function based on boson sampling

GM Nikolopoulos - Quantum Information Processing, 2019 - Springer
The quest for practical cryptographic primitives that are robust against quantum computers is
of vital importance for the field of cryptography. Among the abundance of different …