Results 91 to 100 of about 23,383 (317)
A Survey on Elliptic Curve Cryptography
Elliptic curve cryptography (ECC) is the most efficient public key encryption scheme based onelliptic curve concepts that can be used to create faster, smaller, and efficient cryptographic keys. ECCgenerates keys through the properties of the elliptic curve equation instead of the conventional method ofkey generation.
Kinjal Mehta, Dharmesh Patel
openaire +2 more sources
Coherent anti‐stokes Raman spectroscopy (CARS) enables high‐resolution vibrational imaging, yet non‐resonant background (NRB) distorts spectral fidelity. This review highlights NRB removal methods—from experimental strategies and numerical algorithms to emerging deep learning techniques.
Rajendhar Junjuri, Thomas Bocklitz
wiley +1 more source
Optical Chaos Generation and Applications
This review comprehensively examines optical chaos generation via feedback, injection, and optoelectronic methods, emphasizing bandwidth enhancement and time‐delay suppression. Applications include chaos‐synchronized secure communication, physical random number generation, chaotic lidar for cm‐level detection, distributed fiber sensing, and terahertz ...
Wenhui Chen+8 more
wiley +1 more source
Discrete Logarithms in Generalized Jacobians [PDF]
D\'ech\`ene has proposed generalized Jacobians as a source of groups for public-key cryptosystems based on the hardness of the Discrete Logarithm Problem (DLP).
Galbraith, S. D., Smith, B. A.
core +4 more sources
This work proposes a surface elasticity‐based nonlocal model for analyzing the vibrations of bi‐directionally graded tapered nanobeam. The results demonstrate that, in absence of surface effect, the increasing value of tapered parameter leads to stiffness‐hardening of the nanobeam. However, the consideration of surface effect changes this trend and the
Chinika Dangi, Susmita Naskar
wiley +1 more source
In order to prevent personal data from being lacked and improve the existing mobile network roaming anonymous authentication scheme,anonymous security authentication scheme using elliptic curve cryptography and hash functions in mobile network was ...
Yuehui CHEN, Miao HUANG
doaj +2 more sources
Discrete logarithms in curves over finite fields [PDF]
A survey on algorithms for computing discrete logarithms in Jacobians of curves over finite ...
Andreas Enge+4 more
core +5 more sources
Enhanced Elliptic Curve Cryptography
Background/Objectives: Today’s Technological world Information Security is an essential for commercial and legal trading, secrecy, truthfulness and non-reputability. The Elliptic Curve Cryptography (ECC) has become one of the latest trends in the field of Public-Key Cryptography (PKC). ECC promises a faster, efficient and more secured.
S. Thiraviya Regina Rajam+1 more
openaire +2 more sources
This study presents a robust 3D simulation for BBMC, focusing on both fixed and receding receiver scenarios across various conditions. Key parameters such as D, Q, u, and d are tested at different values to assess the performance and reliability of BBMC in applications like drug delivery, addressing critical challenges in nanoscale communication with ...
Mustafa Ozan Duman+3 more
wiley +1 more source
Hardware acceleration of number theoretic transform for zk‐SNARK
An FPGA‐based hardware accelerator with a multi‐level pipeline is designed to support the large‐bitwidth and large‐scale NTT tasks in zk‐SNARK. It can be flexibly scaled to different scales of FPGAs and has been equipped in the heterogeneous acceleration system with the help of HLS and OpenCL.
Haixu Zhao+6 more
wiley +1 more source