Electrochemical Impedance Spectroscopy (EIS) and Equivalent Circuit Models (ECMs) are widely used to characterize the impedance and estimate parameters of electrochemical systems such as batteries. We use a generic ECM with ten parameters grouped to model ...
Since the advent of internet and mass communication, two public-key cryptographic algorithms have shared the monopoly of data encryption and authentication: Diffie-Hellman and RSA.
However, in the last few years, progress made in quantum physics -- and mo ...
The ITER Electron Cyclotron Resonance Heating and Current Drive (ECRH&CD) system relies on 1 MW 170 GHz Gyrotrons to provide the mm-wave power needed for plasma heating, current drive, and magneto-hydrodynamic control. The design and modeling of the contro ...
Euclidean lattices are mathematical objects of increasing interest in the fields of cryptography and error-correcting codes. This doctoral thesis is a study on high-dimensional lattices with the motivation to understand how efficient they are in terms of b ...
In the framework of Impagliazzo's five worlds, a distinction is often made between two worlds, one where public-key encryption exists (Cryptomania), and one in which only one-way functions exist (MiniCrypt). However, the boundaries between these worlds can ...
We employ a novel discrete element method (DEM) force formulation to simulate adhesive wear and assess the effects of material and loading parameters on the properties of the third-body layer (TBL) formed during sliding motion. The study emphasizes the rol ...
Stable and uniform beams with low divergence are required in particle accelerators; therefore, beyond the accelerated current, measuring the beam current spatial uniformity and stability over time is necessary to assess the beam performance, since these pa ...
The ITER Heating Neutral Beam (HNB) source prototype SPIDER (Source for the Production of Ions of Deuterium Extracted from a Radio frequency plasma), hosted at the Neutral Beam Test Facility (NBTF) in Padova, Italy, has recently started operating with evap ...
With the looming threat of large-scale quantum computers, a fair portion of recent cryptographic research has focused on examining cryptographic primitives from the perspective of a quantum adversary. Shor's 1994 result revealed that quantum computers can ...
We consider the problem of nonparametric estimation of the drift and diffusion coefficients of a Stochastic Differential Equation (SDE), based on n independent replicates {Xi(t) : t is an element of [0 , 1]}13 d B(t), where alpha is an element of {0 , 1} a ...