Results 101 to 110 of about 24,925 (334)

AI‐Based D‐Amino Acid Substitution for Optimizing Antimicrobial Peptides to Treat Multidrug‐Resistant Bacterial Infection

open access: yesAdvanced Science, EarlyView.
This study constructed the first D‐amino acid antimicrobial peptide dataset and developed an AI model for efficient screening of substitution sites, with 80% of candidate peptides showing enhanced activity. The lead peptide dR2‐1 demonstrated potent antimicrobial activity in vitro and in vivo, high stability, and low toxicity.
Yinuo Zhao   +14 more
wiley   +1 more source

High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves (Extended Thesis Summary)

open access: yesCLEI Electronic Journal
Cryptography based on elliptic curves is endowed with efficient methods for public-key cryptography. Recent research has shown the superiority of the Montgomery and Edwards curves over the Weierstrass curves as they require fewer arithmetic operations ...
Armando Faz Hernandez, Julio López
doaj   +1 more source

Analysis of the Fault Attack ECDLP over Prime Field

open access: yesJournal of Applied Mathematics, 2011
In 2000, Biehl et al. proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. An elliptic curve E is defined over prime field 𝔽p with base point P∈E(𝔽p).
Mingqiang Wang, Tao Zhan
doaj   +1 more source

Higher‐Level Structural Classification of Pseudomonas Cyclic Lipopeptides through Their Bioactive Conformation

open access: yesAdvanced Science, EarlyView.
Solution structures of a series of cyclic lipodepsipeptides from Pseudomonas reveal that these specialized metabolites adopt left‐handed alpha helical conformations of only two types, being either ‘stapled’ or ‘catch‐pole’ helix. The particular modular distribution of the biosynthetic gene clusters is found to determine the extent of their conserved ...
Benjámin Kovács   +9 more
wiley   +1 more source

Medical Image Detection & Privacy Management With Elliptic Curve GOPSO Cryptographic Optimization Technique on the Internet of Health Things [PDF]

open access: green, 2021
Anthony Vincent B   +5 more
openalex   +1 more source

Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes [PDF]

open access: yes, 2015
We give a general framework for uniform, constant-time one-and two-dimensional scalar multiplication algorithms for elliptic curves and Jacobians of genus 2 curves that operate by projecting to the x-line or Kummer surface, where we can exploit faster ...
Chung, Ping Ngai   +2 more
core   +3 more sources

Compensatory Interplay Between Clarin‐1 and Clarin‐2 Deafness‐Associated Proteins Governs Phenotypic Variability in Hearing

open access: yesAdvanced Science, EarlyView.
Functional compensation between clarin‐1 and clarin‐2 in cochlear hair cells. Hearing loss associated with CLRN1 mutations shows striking phenotypic variability; however, the underlying mechanisms remain poorly understood. This study reveals that clarin‐1 and clarin‐2 function cooperatively in cochlear hair cells to sustain mechanoelectrical ...
Maureen Wentling   +17 more
wiley   +1 more source

Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing

open access: yesIEEE Access
Cloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing.
K. Sasikumar, Sivakumar Nagarajan
doaj   +1 more source

Dual-field modular multiplier using Kogge-Stone adder

open access: yesDianzi Jishu Yingyong, 2019
As the key operation, modular multiplication is the highest frequency of use in elliptic curve cryptography algorithm. Improving its operation speed is great significant to improve the performance of elliptic curve cryptography processor.
Yang Danyang   +4 more
doaj   +1 more source

Integrating identity-based cryptography in IMS service authentication

open access: yes, 2009
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed   +3 more
core   +6 more sources

Home - About - Disclaimer - Privacy