Results 131 to 140 of about 19,915 (293)
Correction: Cryptanalysis and improvement of an elliptic curve based signcryption scheme for firewalls. [PDF]
Bashir MZU, Ali R.
europepmc +1 more source
Spin‐Polarized Antiferromagnets for Spintronics
This review highlights recent advances in anomalous and spin transport phenomena in spin‐polarized antiferromagnets. Key effects—including the anomalous Hall, Nernst, and magneto‐optical effects—are discussed across various antiferromagnetic platforms.
Zhenzhou Guo+5 more
wiley +1 more source
Factoring Integers with Elliptic Curves
Summary: This paper is devoted to the description and analysis of a new algorithm to factor positive integers. It depends on the use of elliptic curves. The new method is obtained from \textit{J. M. Pollard}'s \(p-1\)-method [Proc. Camb. Philos. Soc. 76, 521--528 (1974; Zbl 0294.10005)] by replacing the multiplicative group by the group of points on a ...
openaire +6 more sources
Elliptic curves and modularity
We survey results and conjectures concerning the modularity of elliptic curves over number fields.
openaire +2 more sources
Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm. [PDF]
Chang X+4 more
europepmc +1 more source
An octahedrally coordinated MnCl2N4 structure anchored on hard carbon tailors the electronic environment of single atoms to lower zinc nucleation barriers. Chloride‐assisted Zn adsorption with Jahn‐Teller distortion and residual Zn enables reduced overpotential.
Yibo Zhu+12 more
wiley +1 more source
Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things. [PDF]
Zhao X, Li D, Li H.
europepmc +1 more source
Arithmetic of Elliptic Curves Upon Quadratic Extension [PDF]
Kenneth Kramer
openalex +1 more source