Results 101 to 110 of about 24,382 (331)

Nanoscopic Mapping of the Extracellular Space in Amyloid Plaque‐rich Cortex

open access: yesAdvanced Science, EarlyView.
The extracellular space and diffusion around amyloid plaques are examined using shadow imaging and single‐particle tracking. Increased diffusivity is found near plaques, extracellular matrix alterations, and plaque core penetrability that varies with amyloid phenotype.
Juan Estaún‐Panzano   +11 more
wiley   +1 more source

Analysis of the Fault Attack ECDLP over Prime Field

open access: yesJournal of Applied Mathematics, 2011
In 2000, Biehl et al. proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. An elliptic curve E is defined over prime field 𝔽p with base point P∈E(𝔽p).
Mingqiang Wang, Tao Zhan
doaj   +1 more source

Stopping time signatures for some algorithms in cryptography [PDF]

open access: yes, 2019
We consider the normalized distribution of the overall running times of some cryptographic algorithms, and what information they reveal about the algorithms.
Deift, Percy   +2 more
core   +1 more source

The Importance of Being Imperfect: Structure and Function of Bacterial Amyloid

open access: yesAdvanced Science, EarlyView.
Functional bacterial amyloids such as CsgA and FapC have been widely studied to understand the relationship between aggregation and function. The recently solved structure of FapC reveals a Greek‐key motif in which extensive hydrogen bonding and packing interactions formed by residues in conserved imperfect repeats stabilize a β‐solenoid core.
Samuel Peña‐Díaz   +12 more
wiley   +1 more source

Crystal Structures and Intermolecular Interactions in α$\alpha$‐ and β$\beta$‐phosgene

open access: yesAngewandte Chemie, EarlyView.
Despite its notorious reputation as a war gas, phosgene (COCl2${\rm COCl}_2$) is one of the most important intermediate chemicals in industry. In this study, we present the crystal structures of two phosgene polymorphs as deduced from powder neutron diffraction and show which intermolecular interactions stabilise the different modifications.
Sven Ringelband   +6 more
wiley   +2 more sources

High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves (Extended Thesis Summary)

open access: yesCLEI Electronic Journal
Cryptography based on elliptic curves is endowed with efficient methods for public-key cryptography. Recent research has shown the superiority of the Montgomery and Edwards curves over the Weierstrass curves as they require fewer arithmetic operations ...
Armando Faz Hernandez, Julio López
doaj   +1 more source

Higher‐Level Structural Classification of Pseudomonas Cyclic Lipopeptides through Their Bioactive Conformation

open access: yesAdvanced Science, EarlyView.
Solution structures of a series of cyclic lipodepsipeptides from Pseudomonas reveal that these specialized metabolites adopt left‐handed alpha helical conformations of only two types, being either ‘stapled’ or ‘catch‐pole’ helix. The particular modular distribution of the biosynthetic gene clusters is found to determine the extent of their conserved ...
Benjámin Kovács   +9 more
wiley   +1 more source

Dual-field modular multiplier using Kogge-Stone adder

open access: yesDianzi Jishu Yingyong, 2019
As the key operation, modular multiplication is the highest frequency of use in elliptic curve cryptography algorithm. Improving its operation speed is great significant to improve the performance of elliptic curve cryptography processor.
Yang Danyang   +4 more
doaj   +1 more source

Modulation of Electronic Structure in Kraft Lignin‐Derived Mo Single‐Atom Catalysts for Optimized Electrochemical Oxygen Reduction

open access: yesAdvanced Science, EarlyView.
Biomass‐derived lignin is used as a sustainable precursor to synthesize Mo single atoms anchored on a nitrogen‐coordinated carbon framework. As the Mo structure transitions from MoC clusters to isolated single‐atom sites, oxygen evolution reaction (ORR) activity progressively improves.
Junbeom Park   +16 more
wiley   +1 more source

Hardware acceleration of number theoretic transform for zk‐SNARK

open access: yesEngineering Reports, EarlyView., 2023
An FPGA‐based hardware accelerator with a multi‐level pipeline is designed to support the large‐bitwidth and large‐scale NTT tasks in zk‐SNARK. It can be flexibly scaled to different scales of FPGAs and has been equipped in the heterogeneous acceleration system with the help of HLS and OpenCL.
Haixu Zhao   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy