Since the advent of internet and mass communication, two public-key cryptographic algorithms have shared the monopoly of data encryption and authentication: Diffie-Hellman and RSA.
However, in the last few years, progress made in quantum physics -- and mo ...
Smart contracts have emerged as the most promising foundations for applications of the blockchain technology. Even though smart contracts are expected to serve as the backbone of the next-generation web, they have several limitations that hinder their wide ...
Billions of people now have conversations daily over the Internet. A large portion of this communication takes place via secure messaging protocols that offer "end-to-end encryption'" guarantees and resilience to compromise like the widely-used Double Ratc ...
Surface roughness is a key factor when it comes to friction and wear, as well as to other physical properties. These phenomena are controlled by mechanisms acting at small scales, in which the topography of apparently flat surfaces is revealed. Roughness i ...
Situational awareness strategies are essential for the reliable and secure operation of the electric power grid which represents critical infrastructure in modern society. With the rise of converter-interfaced renewable generation and the consequent shift ...
Mechanical resonators are widely used in sensors, transducers and optomechanical systems, where mechanical dissipation sets the ultimate limit to performance. Over the past 15 years, the quality factors in strained mechanical resonators have increased by f ...
We propose a comparative study of three different methods aimed at optimizing existing groundwater monitoring networks. Monitoring piezometric heads in subsurface porous formations is crucial at regional scales to properly characterize the relevant subsurf ...
As large, data-driven artificial intelligence models become ubiquitous, guaranteeing high data quality is imperative for constructing models. Crowdsourcing, community sensing, and data filtering have long been the standard approaches to guaranteeing or imp ...
At room temperature, mechanical motion driven by the quantum backaction of light has been observed only in pioneering experiments in which an optical restoring force controls the oscillator stiffness1,2. For solid-state mechanical resonators in which oscil ...
Multiple tensor-times-matrix (Multi-TTM) is a key computation in algorithms for computing and operating with the Tucker tensor decomposition, which is frequently used in multidimensional data analysis. We establish communication lower bounds that determine ...