Results 131 to 140 of about 1,067,462 (345)
CeiTEA: Adaptive Hierarchy of Single Cells with Topological Entropy
CeiTEA, a novel hierarchical clustering algorithm based on topological entropy, effectively captures complex structures underlying data. By constructing an adaptive multi‐nary partition tree, CeiTEA reveals hierarchical structures and local diversifications, outperforming existing methods in clustering accuracy and consistency and providing the ...
Bowen Tan+3 more
wiley +1 more source
Design Validations for Discrete Logarithm Based Signature Schemes
Ernest F. Brickell+3 more
openalex +1 more source
Birthday attack to discrete logarithm
The discrete logarithm in a finite group of large order has been widely applied in public key cryptosystem. In this paper, we will present a probabilistic algorithm for discrete logarithm.
openaire +2 more sources
Laser‐Induced Coal‐Based Porous Graphene as Anode Toward Advanced Lithium‐Ion Battery
A one‐step laser‐induced strategy is reported to prepare porous graphene by utilizing bituminous coal as a precursor (LIG‐B). Laser irradiation transforms coal into graphene, with small molecules from the polymer separating, recombining in gas and forming 3D porous graphene upon quick gas release.
Xiao Ma+5 more
wiley +1 more source
Recommendations for Discrete-Logarithm Based Cryptography:
Dustin Moody
semanticscholar +1 more source
A single‐cell metasurface is designed to multiplex holographic images across both spin and wavelength channels using a single‐phase map. By employing inverse design and automatic differentiation, the metasurface achieves 36 channel multiplexing across the visible to near‐infrared spectrum.
Cherry Park, Youngsun Jeon, Junsuk Rho
wiley +1 more source
Armoring Boron Nitride with Pyrolytic Carbon Layers for Tunable Rigidity and Flexibility
By precisely controlling the thickness of the PyC armor, the BN@PyC aerogel achieves a remarkable transformation in mechanical properties, spanning multiple orders of magnitude from flexibility to rigidity, while simultaneously exhibiting versatility, including elastic responsive conductivity, enhanced thermal conductivity, and outstanding ablative ...
Meng Lan+5 more
wiley +1 more source
Cryptographic hardness assumptions identification based on discrete wavelet transform
Cryptanalysts can use appropriate attack strategies to attempt decryption by accurately identifying the cryptographic hardness assumption underlying ciphertexts or digital signatures.
Ke Yuan+6 more
doaj +1 more source
Key Agreement Protocol (KAP) Using Conjugacy and Discrete Logarithm Problems in Group Representation Level [PDF]
Eligijus Sakalauskas+2 more
openalex +1 more source
A data‐driven workflow integrating molecular dynamics simulations and machine learning enables efficient discovery of optimized lithium battery electrolytes. Key structural descriptors are screened for predicting coordination behavior and ion transport. Gaussian process regression identifies an optimal feature space, guiding rational electrolyte design.
Xiwang Chang+8 more
wiley +1 more source