Browse Articles

Giving Teens a Voice: Sources of Stress for High School Students

Corson et al. | Sep 09, 2019

Giving Teens a Voice: Sources of Stress for High School Students

The authors investigate the negative effects stress has on teen mental and physical health. Through a survey, they give Virginia teens a voice in revising the Health and Physical Education curriculum to include a standards of learning (SOL). Notably they identify factors contributing to stress levels including homework level, amount of free and sleep time, parental pressure and family encouragement.

Read More...

A meta-analysis on NIST post-quantum cryptographic primitive finalists

Benny et al. | Sep 21, 2024

A meta-analysis on NIST post-quantum cryptographic primitive finalists
Image credit: Benny et al. 2024

The advent of quantum computing will pose a substantial threat to the security of classical cryptographic methods, which could become vulnerable to quantum-based attacks. In response to this impending challenge, the field of post-quantum cryptography has emerged, aiming to develop algorithms that can withstand the computational power of quantum computers. This study addressed the pressing concern of classical cryptographic methods becoming vulnerable to quantum-based attacks due to the rise of quantum computing. The emergence of post-quantum cryptography has led to the development of new resistant algorithms. Our research focused on four quantum-resistant algorithms endorsed by America’s National Institute of Standards and Technology (NIST) in 2022: CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON, and SPHINCS+. This study evaluated the security, performance, and comparative attributes of the four algorithms, considering factors such as key size, encryption/decryption speed, and complexity. Comparative analyses against each other and existing quantum-resistant algorithms provided insights into the strengths and weaknesses of each program. This research explored potential applications and future directions in the realm of quantum-resistant cryptography. Our findings concluded that the NIST algorithms were substantially more effective and efficient compared to classical cryptographic algorithms. Ultimately, this work underscored the need to adapt cryptographic techniques in the face of advancing quantum computing capabilities, offering valuable insights for researchers and practitioners in the field. Implementing NIST-endorsed quantum-resistant algorithms substantially reduced the vulnerability of cryptographic systems to quantum-based attacks compared to classical cryptographic methods.

Read More...

Efficacy of Rotten and Fresh Fruit Extracts as the Photosensitive Dye for Dye-Sensitized Solar Cells

Jayasankar et al. | Jan 16, 2019

Efficacy of Rotten and Fresh Fruit Extracts as the Photosensitive Dye for Dye-Sensitized Solar Cells

Dye-sensitized solar cells (DSSC) use dye as the photoactive material, which capture the incoming photon of light and use the energy to excite electrons. Research in DSSCs has centered around improving the efficacy of photosensitive dyes. A fruit's color is defined by a unique set of molecules, known as a pigment profile, which changes as a fruit progresses from ripe to rotten. This project investigates the use of fresh and rotten fruit extracts as the photoactive dye in a DSSC.

Read More...
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember