Results 41 to 50 of about 22,366 (287)
Implementasi Algoritma ECDSA untuk Pengamanan E-Mail (Verifikasi Keaslian Pesan) [PDF]
This final project is discussed about implementation of digital signature on email delivery with java programming language. Digital signature is one of the cryptographic security services that provide assurance to the recipient of the message (receiver).
Prabowo, Pualam Sendi Agung +2 more
core
Families of fast elliptic curves from Q-curves [PDF]
We construct new families of elliptic curves over \(\FF_{p^2}\) with efficiently computable endomorphisms, which can be used to accelerate elliptic curve-based cryptosystems in the same way as Gallant-Lambert-Vanstone (GLV) and Galbraith-Lin-Scott (GLS ...
Smith, Benjamin
core +7 more sources
High Entropy Wide‐Bandgap Borates with Broadband Luminescence and Large Nonlinear Optical properties
High‐entropy rare‐earth borates exhibit excellent nonlinear optical and broadband luminescence properties arising from multi‐component doping, chemical disorder, increased configurational entropy, and increased lattice and electronic anharmonicity. This formulation enabled us to obtain a large, environmentally stable single crystal with 3X higher laser‐
Saugata Sarker +14 more
wiley +1 more source
Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations
Herrera Joancomartí, Jordi +1 more
core +4 more sources
Ultrathin AlOxHy interlayers between aluminum films and polymer substrates significantly improve electro‐mechanical properties of flexible thin film systems. By precisely controlling interlayer thickness using atomic layer deposition, this study identifies an optimal interlayer thickness of 5–10 nm that enhances ductility and delays cracking.
Johanna Byloff +9 more
wiley +1 more source
Decrypting the Link Between Elliptic Primes and Twin Primes [PDF]
From Caesar’s cipher to Germany’s enigma machine to modern day cryptosytems, cryptography spans throughout history. Methods of encryption have evolved over hundreds of years and continue to evolve as computational efficiency increases.
Babinkostova, Liljana, (Mentor) +8 more
core +1 more source
Mechanically Stable and Tunable Photoactivated Peptide‐Based Hydrogels for Soft Tissue Adhesion
A collagen‐like peptide hydrogel platform is developed using supramolecular self‐assembly and light‐triggered crosslinking. It creates mechanically stable, tunable hydrogels with cytocompatibility and biodegradability, making them potential soft tissue adhesives.
Alex Ross +8 more
wiley +1 more source
Elliptic Curve Cryptography with Machine Learning
Elliptic Curve Cryptography (ECC) is a technology based on the arithmetic of elliptic curves used to build strong and efficient cryptosystems and infrastructures. Several ECC systems, such as the Diffie–Hellman key exchange and the Elliptic Curve Digital
Jihane Jebrane +3 more
doaj +1 more source
Secure and Efficient RNS Approach for Elliptic Curve Cryptography [PDF]
Scalar multiplication, the main operation in elliptic curve cryptographic protocols, is vulnerable to side-channel (SCA) and fault injection (FA) attacks.
Batina, Lejla +3 more
core
Secure Elliptic Curves in Cryptography [PDF]
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of elliptic curves. In the short life of ECC, most standards have proposed curves defined over prime finite fields using the short Weierstrass form. However, some researchers have started to propose as a more secure alternative the use of Edwards and ...
Gayoso Martínez, Victor +2 more
openaire +2 more sources

