#### Filter Results:

- Full text PDF available (71)

#### Publication Year

1956

2017

- This year (2)
- Last 5 years (8)
- Last 10 years (26)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Cell Type

#### Key Phrases

#### Method

Learn More

- Ravikanth Pappu, Ben Recht, Jason Taylor, Neil Gershenfeld
- Science
- 2002

Modern cryptographic practice rests on the use of one-way functions, which are easy to evaluate but difficult to invert. Unfortunately, commonly used one-way functions are either based on unproven conjectures or have known vulnerabilities. We show that instead of relying on number theory, the mesoscopic physics of coherent transport through a disordered… (More)

- Neil Gershenfeld, Raffi Krikorian, Danny Cohen
- Scientific American
- 2004

Most present symmetric encryption algorithms result from a tradeoff between implementation cost and resulting performances. In addition, they generally aim to be implemented efficiently on a large variety of platforms. In this paper, we take an opposite approach and consider a context where we have very limited processing resources and throughput… (More)

Quantum computation remains an enormously appealing but elusive goal. It is appealing because of its potential to perform superfast algorithms, such as finding prime factors in polynomial time, but also elusive because of the difficulty of simultaneously manipulating quantum degrees of freedom while preventing environmentally induced decoherence. A new… (More)

- John Kymissis, Clyde Kendall, Joseph A. Paradiso, Neil Gershenfeld
- SEMWEB
- 1998

system to date has served all of the needs of wearable computing—light weight, minimum effort, high power generation, convenient power delivery, and good power regulation. We believe that our approach has the potential to solve these problems for a class of wearable devices by placing both the generator and powered electronics in a location where… (More)

- Rehmi Post, Maggie Orth, Peter Russo, Neil Gershenfeld
- IBM Systems Journal
- 2000

1

A non-contact sensor based on the interaction of a person with electric fields for human-computer interface is investigated. Two sensing modes are explored: an external electric field shunted to ground through a human body, and an external electric field transmitted through a human body to stationary receivers. The sensors are low power (milliwatts), high… (More)

- Neil Gershenfeld
- 1999

- Mung Chiang, Steven Low, +31 authors Junshan Zhang
- 2006

Network protocols in layered architectures have historically been obtained on an ad hoc basis, and many of the recent cross-layer designs are conducted through piecemeal approaches. They may instead be holistically analyzed and systematically designed as distributed solutions to some global optimization problems. This paper presents a survey of the recent… (More)