Results 41 to 50 of about 22,366 (287)

Implementasi Algoritma ECDSA untuk Pengamanan E-Mail (Verifikasi Keaslian Pesan) [PDF]

open access: yes, 2010
This final project is discussed about implementation of digital signature on email delivery with java programming language. Digital signature is one of the cryptographic security services that provide assurance to the recipient of the message (receiver).
Prabowo, Pualam Sendi Agung   +2 more
core  

Families of fast elliptic curves from Q-curves [PDF]

open access: yes, 2013
We construct new families of elliptic curves over \(\FF_{p^2}\) with efficiently computable endomorphisms, which can be used to accelerate elliptic curve-based cryptosystems in the same way as Gallant-Lambert-Vanstone (GLV) and Galbraith-Lin-Scott (GLS ...
Smith, Benjamin
core   +7 more sources

High Entropy Wide‐Bandgap Borates with Broadband Luminescence and Large Nonlinear Optical properties

open access: yesAdvanced Functional Materials, EarlyView.
High‐entropy rare‐earth borates exhibit excellent nonlinear optical and broadband luminescence properties arising from multi‐component doping, chemical disorder, increased configurational entropy, and increased lattice and electronic anharmonicity. This formulation enabled us to obtain a large, environmentally stable single crystal with 3X higher laser‐
Saugata Sarker   +14 more
wiley   +1 more source

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]

open access: yes, 2011
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations
Herrera Joancomartí, Jordi   +1 more
core   +4 more sources

From Mechanics to Electronics: Influence of ALD Interlayers on the Multiaxial Electro‐Mechanical Behavior of Metal–Oxide Bilayers

open access: yesAdvanced Functional Materials, EarlyView.
Ultrathin AlOxHy interlayers between aluminum films and polymer substrates significantly improve electro‐mechanical properties of flexible thin film systems. By precisely controlling interlayer thickness using atomic layer deposition, this study identifies an optimal interlayer thickness of 5–10 nm that enhances ductility and delays cracking.
Johanna Byloff   +9 more
wiley   +1 more source

Decrypting the Link Between Elliptic Primes and Twin Primes [PDF]

open access: yes, 2017
From Caesar’s cipher to Germany’s enigma machine to modern day cryptosytems, cryptography spans throughout history. Methods of encryption have evolved over hundreds of years and continue to evolve as computational efficiency increases.
Babinkostova, Liljana, (Mentor)   +8 more
core   +1 more source

Mechanically Stable and Tunable Photoactivated Peptide‐Based Hydrogels for Soft Tissue Adhesion

open access: yesAdvanced Functional Materials, EarlyView.
A collagen‐like peptide hydrogel platform is developed using supramolecular self‐assembly and light‐triggered crosslinking. It creates mechanically stable, tunable hydrogels with cytocompatibility and biodegradability, making them potential soft tissue adhesives.
Alex Ross   +8 more
wiley   +1 more source

Elliptic Curve Cryptography with Machine Learning

open access: yesCryptography
Elliptic Curve Cryptography (ECC) is a technology based on the arithmetic of elliptic curves used to build strong and efficient cryptosystems and infrastructures. Several ECC systems, such as the Diffie–Hellman key exchange and the Elliptic Curve Digital
Jihane Jebrane   +3 more
doaj   +1 more source

Secure and Efficient RNS Approach for Elliptic Curve Cryptography [PDF]

open access: yes, 2016
Scalar multiplication, the main operation in elliptic curve cryptographic protocols, is vulnerable to side-channel (SCA) and fault injection (FA) attacks.
Batina, Lejla   +3 more
core  

Secure Elliptic Curves in Cryptography [PDF]

open access: yes, 2017
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of elliptic curves. In the short life of ECC, most standards have proposed curves defined over prime finite fields using the short Weierstrass form. However, some researchers have started to propose as a more secure alternative the use of Edwards and ...
Gayoso Martínez, Victor   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy