Results 111 to 120 of about 23,383 (317)
This review spotlights key advances in chiral halide perovskite materials and devices, covering device architectures, fabrication methods, and emerging applications like circularly polarized light functions, neuromorphic computing, and spintronics. It explores structure‐property relationships and chirality transfer mechanisms, discusses challenges in ...
Qi Liu, Hui Ren, Qi Wei, Mingjie Li
wiley +1 more source
Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems. [PDF]
Tidrea A, Korodi A, Silea I.
europepmc +1 more source
Stopping time signatures for some algorithms in cryptography [PDF]
We consider the normalized distribution of the overall running times of some cryptographic algorithms, and what information they reveal about the algorithms.
Deift, Percy+2 more
core +1 more source
A Robotic Hand with Soft Transmission Systems for Automated Operations of Computer Mouse
This article introduces a soft robotic hand designed to automate computer mouse operations. Inspired by the water vascular system, the bellows‐enclosed soft transmission system is proposed. This system can handle typical office and gaming tasks using vision and speech commands, holding the potential for applications in office scenes and gaming hardware
Yiming He+4 more
wiley +1 more source
Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing
Cloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing.
K. Sasikumar, Sivakumar Nagarajan
doaj +1 more source
Lightweight Authentication Mechanism for Industrial IoT Environment Combining Elliptic Curve Cryptography and Trusted Token. [PDF]
Yang YS+5 more
europepmc +1 more source
Distortion maps for genus two curves [PDF]
Distortion maps are a useful tool for pairing based cryptography. Compared with elliptic curves, the case of hyperelliptic curves of genus g > 1 is more complicated since the full torsion subgroup has rank 2g.
Galbraith, Steven D.+3 more
core +3 more sources
Use of Elliptic Curves in Cryptography [PDF]
We discuss the use of elliptic curves in cryptography. In particular, we propose an analogue of the Diffie-Hellmann key exchange protocol which appears to be immune from attacks of the style of Western, Miller, and Adleman. With the current bounds for infeasible attack, it appears to be about 20% faster than the Diffie-Hellmann scheme over GF(p).
openaire +1 more source
Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments [PDF]
Murat Fiskiran, Lee
openalex +1 more source
The design of the entire paper. Green part represents the bioinformatics analysis approach. Yellow part represents the ideas of animal experiment. Abstract Background Chronic obstructive pulmonary disease (COPD) is a type of chronic respiratory disease.
Xuejing Luan+5 more
wiley +1 more source