Results 101 to 110 of about 24,925 (334)
This study constructed the first D‐amino acid antimicrobial peptide dataset and developed an AI model for efficient screening of substitution sites, with 80% of candidate peptides showing enhanced activity. The lead peptide dR2‐1 demonstrated potent antimicrobial activity in vitro and in vivo, high stability, and low toxicity.
Yinuo Zhao +14 more
wiley +1 more source
Cryptography based on elliptic curves is endowed with efficient methods for public-key cryptography. Recent research has shown the superiority of the Montgomery and Edwards curves over the Weierstrass curves as they require fewer arithmetic operations ...
Armando Faz Hernandez, Julio López
doaj +1 more source
Analysis of the Fault Attack ECDLP over Prime Field
In 2000, Biehl et al. proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. An elliptic curve E is defined over prime field 𝔽p with base point P∈E(𝔽p).
Mingqiang Wang, Tao Zhan
doaj +1 more source
Solution structures of a series of cyclic lipodepsipeptides from Pseudomonas reveal that these specialized metabolites adopt left‐handed alpha helical conformations of only two types, being either ‘stapled’ or ‘catch‐pole’ helix. The particular modular distribution of the biosynthetic gene clusters is found to determine the extent of their conserved ...
Benjámin Kovács +9 more
wiley +1 more source
Medical Image Detection & Privacy Management With Elliptic Curve GOPSO Cryptographic Optimization Technique on the Internet of Health Things [PDF]
Anthony Vincent B +5 more
openalex +1 more source
Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes [PDF]
We give a general framework for uniform, constant-time one-and two-dimensional scalar multiplication algorithms for elliptic curves and Jacobians of genus 2 curves that operate by projecting to the x-line or Kummer surface, where we can exploit faster ...
Chung, Ping Ngai +2 more
core +3 more sources
Functional compensation between clarin‐1 and clarin‐2 in cochlear hair cells. Hearing loss associated with CLRN1 mutations shows striking phenotypic variability; however, the underlying mechanisms remain poorly understood. This study reveals that clarin‐1 and clarin‐2 function cooperatively in cochlear hair cells to sustain mechanoelectrical ...
Maureen Wentling +17 more
wiley +1 more source
Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing
Cloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing.
K. Sasikumar, Sivakumar Nagarajan
doaj +1 more source
Dual-field modular multiplier using Kogge-Stone adder
As the key operation, modular multiplication is the highest frequency of use in elliptic curve cryptography algorithm. Improving its operation speed is great significant to improve the performance of elliptic curve cryptography processor.
Yang Danyang +4 more
doaj +1 more source
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed +3 more
core +6 more sources

