Results 111 to 120 of about 177,129 (337)

Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network

open access: yesDianxin kexue, 2016
In order to prevent personal data from being lacked and improve the existing mobile network roaming anonymous authentication scheme,anonymous security authentication scheme using elliptic curve cryptography and hash functions in mobile network was ...
Yuehui CHEN, Miao HUANG
doaj   +2 more sources

A Robotic Hand with Soft Transmission Systems for Automated Operations of Computer Mouse

open access: yesAdvanced Intelligent Systems, EarlyView.
This article introduces a soft robotic hand designed to automate computer mouse operations. Inspired by the water vascular system, the bellows‐enclosed soft transmission system is proposed. This system can handle typical office and gaming tasks using vision and speech commands, holding the potential for applications in office scenes and gaming hardware
Yiming He   +4 more
wiley   +1 more source

Particle saltation trajectories in supercritical open channel flows: Roughness effect

open access: yesEarth Surface Processes and Landforms, Volume 47, Issue 15, Page 3588-3610, December 2022., 2022
This study investigates single particle trajectories in supercritical open channel flows under different hydraulic and roughness conditions. Therefore, it helps to get a better understanding on the mechanics and prediction of bedrock incision and hydro‐abrasion occurring in steep bedrock rivers and hydraulic structures.
Dila Demiral   +3 more
wiley   +1 more source

FPGA Implementation of Elliptic Curve Cryptoprocessor for Perceptual Layer of the Internet of Things

open access: yesEAI Endorsed Transactions on Security and Safety, 2018
Today’s developing era data and information security plays an important role in unsecured communication between Internet of Things (IoT) elements. In IoT, data are transmitted in plaintext for many reasons.
V. Kamalakannan, S. Tamilselvan
doaj   +1 more source

More constructing pairing-friendly elliptic curves for cryptography [PDF]

open access: yesarXiv, 2007
The problem of constructing elliptic curves suitable for pairing applications has received a lot of attention. To solve this, we propose a variant algorithm of a known method by Brezing and Weng. We produce new families of parameters using our algorithm for pairing-friendly elliptic curves of embedding degree 8, and we actually compute some explicit ...
arxiv  

Elligator : elliptic-curve points indistinguishable from uniform random strings [PDF]

open access: yes, 2013
Censorship-circumvention tools are in an arms race against censors. The censors study all traffic passing into and out of their controlled sphere, and try to disable censorship-circumvention tools without completely shutting down the Internet.
Bernstein, D.J.   +3 more
core  

Drinfeld modules may not be for isogeny based cryptography [PDF]

open access: yes, 2020
Elliptic curves play a prominent role in cryptography. For instance, the hardness of the elliptic curve discrete logarithm problem is a foundational assumption in public key cryptography.
Anand Kumar Narayanan, Antoine Joux
core  

An immersed boundary vector potential‐vorticity meshless solver of the incompressible Navier–Stokes equation

open access: yesInternational Journal for Numerical Methods in Fluids, Volume 95, Issue 1, Page 143-175, January 2023., 2023
We present a new strong‐form meshless solver combined with the boundary condition‐enforced immersed boundary method for the numerical solution of the nonstationary, incompressible, viscous Navier–Stokes equations in their stream function‐vorticity (in 2D) and vector potential‐vorticity (in 3D) formulation.
George C. Bourantas   +6 more
wiley   +1 more source

Metrics on the Sets of Nonsupersingular Elliptic Curves in Simplified Weierstrass Form over Finite Fields of Characteristic Two

open access: yesInternational Journal of Mathematics and Mathematical Sciences, 2015
Elliptic curves have a wide variety of applications in computational number theory such as elliptic curve cryptography, pairing based cryptography, primality tests, and integer factorization.
Keisuke Hakuta
doaj   +1 more source

New algorithm for the discrete logarithm problem on elliptic curves [PDF]

open access: yesarXiv, 2015
A new algorithms for computing discrete logarithms on elliptic curves defined over finite fields is suggested. It is based on a new method to find zeroes of summation polynomials. In binary elliptic curves one is to solve a cubic system of Boolean equations.
arxiv  

Home - About - Disclaimer - Privacy