Results 11 to 20 of about 134,362 (311)

Image quality comparisons of coil setups in 3T MRI for brain and head and neck radiotherapy simulations

open access: yesJournal of Applied Clinical Medical Physics, Volume 23, Issue 12, December 2022., 2022
Abstract Purpose MRI is increasingly used for brain and head and neck radiotherapy treatment planning due to its superior soft tissue contrast. Flexible array coils can be arranged to encompass treatment immobilization devices, which do not fit in diagnostic head/neck coils. Selecting a flexible coil arrangement to replace a diagnostic coil should rely
Evangelia Kaza   +6 more
wiley   +1 more source

Joint application of hybrid iterative reconstruction and adaptive filters on neck‐and‐shoulder CT imaging: A clinical evaluation

open access: yesJournal of Applied Clinical Medical Physics, Volume 23, Issue 12, December 2022., 2022
Abstract Purpose To assess whether the joint application of hybrid iterative reconstruction (HIR) and an adaptive filter (AF) could reduce streak artifacts and improve image quality of neck‐and‐shoulder computed tomography (CT). Methods This study included 96 patients with suspicious neck lesions who underwent a routine nonenhanced scan on a 64‐slice ...
Wenfeng Jin   +6 more
wiley   +1 more source

Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography

open access: yesCybernetics and Information Technologies, 2021
The survey presents the evolution of Short Weierstrass elliptic curves after their introduction in cryptography. Subsequently, this evolution resulted in the establishment of present elliptic curve computational standards.
Abhishek Kunal   +1 more
doaj   +1 more source

Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols

open access: yesIEEE Access, 2020
Kleptography is the study of pilfering secure data secretly and subliminally. The concept of inserting backdoors was introduced two decades ago by Young and Yung. However, still it is a serious threat for modern cryptography.
Anum Sajjad   +5 more
doaj   +1 more source

Combined small subgroups and side-channel attack on elliptic curves with cofactor divisible by 2m [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2019
Nowadays, alternative models of elliptic curves like Montgomery, Edwards, twisted Edwards, Hessian, twisted Hessian, Huff’s curves and many others are very popular and many people use them in cryptosystems which are based on elliptic curve cryptography ...
Michał Wrońska
doaj   +1 more source

The positive integral points on the elliptic curve 𝒚𝟐=𝟕𝒑𝒙(𝒙𝟐+𝟖) [PDF]

open access: yesE3S Web of Conferences, 2020
The integral point of elliptic curve is a very important problem in both elementary number theory and analytic number theory. In recent years, scholars have paid great attention to solving the problem of positive integer points on elliptic curve 𝑦2 = 𝑘 ...
Xiancun Du, Zhao Jianhong, Yang Lixing
doaj   +1 more source

Twisted Edwards Elliptic Curves for Zero-Knowledge Circuits

open access: yesMathematics, 2021
Circuit-based zero-knowledge proofs have arose as a solution to the implementation of privacy in blockchain applications, and to current scalability problems that blockchains suffer from.
Marta Bellés-Muñoz   +4 more
doaj   +1 more source

Dickson basis multiplier with concurrent error detection against fault attacks for lightweight cryptosystems

open access: yesElectronics Letters, 2022
Fault attacks have been proved for efficiently breaking hardware‐based elliptic curve cryptosystems. One way for fighting against fault attacks is to design the core multiplier circuit of elliptic curve cryptosystem with concurrent error detection ...
Che Wun Chiou   +6 more
doaj   +1 more source

Elliptic nets and elliptic curves [PDF]

open access: yesAlgebra & Number Theory, 2011
An elliptic divisibility sequence is an integer recurrence sequence associated to an elliptic curve over the rationals together with a rational point on that curve. In this paper we present a higher-dimensional analogue over arbitrary base fields. Suppose E is an elliptic curve over a field K, and P_1, ..., P_n are points on E defined over K.
openaire   +5 more sources

Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications

open access: yesEnergies, 2021
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low latencies are required, along with security requirements to protect the large number of attack surfaces to which IoT devices are exposed.
Stefano Di Matteo   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy