Results 101 to 110 of about 24,382 (331)
Nanoscopic Mapping of the Extracellular Space in Amyloid Plaque‐rich Cortex
The extracellular space and diffusion around amyloid plaques are examined using shadow imaging and single‐particle tracking. Increased diffusivity is found near plaques, extracellular matrix alterations, and plaque core penetrability that varies with amyloid phenotype.
Juan Estaún‐Panzano +11 more
wiley +1 more source
Analysis of the Fault Attack ECDLP over Prime Field
In 2000, Biehl et al. proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. An elliptic curve E is defined over prime field 𝔽p with base point P∈E(𝔽p).
Mingqiang Wang, Tao Zhan
doaj +1 more source
Stopping time signatures for some algorithms in cryptography [PDF]
We consider the normalized distribution of the overall running times of some cryptographic algorithms, and what information they reveal about the algorithms.
Deift, Percy +2 more
core +1 more source
The Importance of Being Imperfect: Structure and Function of Bacterial Amyloid
Functional bacterial amyloids such as CsgA and FapC have been widely studied to understand the relationship between aggregation and function. The recently solved structure of FapC reveals a Greek‐key motif in which extensive hydrogen bonding and packing interactions formed by residues in conserved imperfect repeats stabilize a β‐solenoid core.
Samuel Peña‐Díaz +12 more
wiley +1 more source
Crystal Structures and Intermolecular Interactions in α$\alpha$‐ and β$\beta$‐phosgene
Despite its notorious reputation as a war gas, phosgene (COCl2${\rm COCl}_2$) is one of the most important intermediate chemicals in industry. In this study, we present the crystal structures of two phosgene polymorphs as deduced from powder neutron diffraction and show which intermolecular interactions stabilise the different modifications.
Sven Ringelband +6 more
wiley +2 more sources
Cryptography based on elliptic curves is endowed with efficient methods for public-key cryptography. Recent research has shown the superiority of the Montgomery and Edwards curves over the Weierstrass curves as they require fewer arithmetic operations ...
Armando Faz Hernandez, Julio López
doaj +1 more source
Solution structures of a series of cyclic lipodepsipeptides from Pseudomonas reveal that these specialized metabolites adopt left‐handed alpha helical conformations of only two types, being either ‘stapled’ or ‘catch‐pole’ helix. The particular modular distribution of the biosynthetic gene clusters is found to determine the extent of their conserved ...
Benjámin Kovács +9 more
wiley +1 more source
Dual-field modular multiplier using Kogge-Stone adder
As the key operation, modular multiplication is the highest frequency of use in elliptic curve cryptography algorithm. Improving its operation speed is great significant to improve the performance of elliptic curve cryptography processor.
Yang Danyang +4 more
doaj +1 more source
Biomass‐derived lignin is used as a sustainable precursor to synthesize Mo single atoms anchored on a nitrogen‐coordinated carbon framework. As the Mo structure transitions from MoC clusters to isolated single‐atom sites, oxygen evolution reaction (ORR) activity progressively improves.
Junbeom Park +16 more
wiley +1 more source
Hardware acceleration of number theoretic transform for zk‐SNARK
An FPGA‐based hardware accelerator with a multi‐level pipeline is designed to support the large‐bitwidth and large‐scale NTT tasks in zk‐SNARK. It can be flexibly scaled to different scales of FPGAs and has been equipped in the heterogeneous acceleration system with the help of HLS and OpenCL.
Haixu Zhao +6 more
wiley +1 more source

