Results 71 to 80 of about 15,305 (259)

Smart Catheters for Diagnosis, Monitoring, and Therapy

open access: yesAdvanced Healthcare Materials, EarlyView.
This study presents a comprehensive review of smart catheters, an emerging class of medical devices that integrate embedded sensors, robotics, and communication systems, offering increased functionality and complexity to enable real‐time health monitoring, diagnostics, and treatment. Abstract This review explores smart catheters as an emerging class of
Azra Yaprak Tarman   +12 more
wiley   +1 more source

On the first fall degree of summation polynomials

open access: yesJournal of Mathematical Cryptology, 2019
We improve on the first fall degree bound of polynomial systems that arise from a Weil descent along Semaev’s summation polynomials relevant to the solution of the Elliptic Curve Discrete Logarithm Problem via Gröbner basis algorithms.
Kousidis Stavros, Wiemers Andreas
doaj   +1 more source

Taming the Immiscibility of Gold, Iron, and Boron to Craft Chemodegradable Nanoparticles for Multimodal Imaging and Radiotherapy

open access: yesAdvanced Healthcare Materials, EarlyView.
Over half of cancer patients undergo radiotherapy. Laser ablation enabled the synthesis of immiscible Au‐Fe‐B nanoparticles designed as degradable bimodal radiosensitizers for X‐ray radiotherapy (XRT), boron neutron capture therapy (BNCT), and bimodal imaging for X‐ray computed tomography (CT) and magnetic resonance imaging (MRI). These nanosensitizers
Michael Bissoli   +15 more
wiley   +1 more source

Real‐Time 3D Ultrasound Imaging with an Ultra‐Sparse, Low Power Architecture

open access: yesAdvanced Healthcare Materials, EarlyView.
This article presents a novel, ultra‐sparse ultrasound architecture that paves the way for wearable real‐time 3D imaging. By integrating a unique convolutional array with chirped data acquisition, the system achieves high‐resolution volumetric scans at a fraction of the power and hardware complexity.
Colin Marcus   +9 more
wiley   +1 more source

Post-quantum signature algorithms based on the hidden discrete logarithm problem [PDF]

open access: yesComputer Science Journal of Moldova, 2018
New options of the hidden discrete logarithm problem are proposed as cryptographic primitive of the post-quantum signature algorithms. Two signature schemes using computations in finite non-commutative algebras with associative multiplication operation
A.A. Moldovyan, N.A. Moldovyan
doaj  

Computing Discrete Logarithms in Quadratic Orders [PDF]

open access: yesJournal of Cryptology, 2000
Let \(\Delta \equiv 0,1 \pmod{4}\) be a nonsquare integer. The quadratic order of discriminant \(\Delta\) is defined as the \(\mathbb{Z}\)-module \[ \mathcal{O}_{\Delta} = \mathbb{Z} + {\Delta + \sqrt{\Delta} \over 2}{\mathbb{Z}} . \] The field of quotients is \(\mathbb{Q}({\sqrt{\Delta}})\).
openaire   +1 more source

Directional Flow of Confined Polaritons in CrSBr

open access: yesAdvanced Materials, EarlyView.
CrSBr, a layered magnetic semiconductor, naturally channels self‐hybridized excitonpolaritons into highly directional flow. Its intrinsic optical anisotropy, high refractive index, and strong lightmatter coupling enable long‐range guided modes along the a‐axis, with propagation lengths set by their excitonphoton admixture.
Pratap Chandra Adak   +10 more
wiley   +1 more source

Self‐Assembled Inorganic Nanomembrane Tubes: Rolled‐Up Piezoelectrics for Microacoustic Wave‐Based Actuators and Sensors

open access: yesAdvanced Materials, EarlyView.
This study demonstrates a self‐assembly process to generate free‐standing piezoelectric nanomembranes, forming ultracompact microtubular acoustic wave sensors and actuators. The miniaturized 3D piezoelectric platform reported in this work can be applied in telecommunication, energy harvesting, and acoustofluidics. Moreover, the 3D self‐assembly can add
Raphaël C. L‐M. Doineau   +9 more
wiley   +1 more source

Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials

open access: yesIEEE Access, 2018
Most of the existing blind proxy re-signature schemes are designed based on the traditional public key cryptosystems, whose security relies on the hardness of big integer factoring, discrete logarithm, elliptic curve discrete logarithm, and so on ...
Li Huixian   +3 more
doaj   +1 more source

Discrete Logarithms

open access: yes
In this paper we present two algorithms for computing discrete logarithms. We present some properties and show how we break the Diffie-Hellman protocol, which is considered to be very secure.
openaire   +1 more source

Home - About - Disclaimer - Privacy