Results 111 to 120 of about 177,129 (337)
In order to prevent personal data from being lacked and improve the existing mobile network roaming anonymous authentication scheme,anonymous security authentication scheme using elliptic curve cryptography and hash functions in mobile network was ...
Yuehui CHEN, Miao HUANG
doaj +2 more sources
A Robotic Hand with Soft Transmission Systems for Automated Operations of Computer Mouse
This article introduces a soft robotic hand designed to automate computer mouse operations. Inspired by the water vascular system, the bellows‐enclosed soft transmission system is proposed. This system can handle typical office and gaming tasks using vision and speech commands, holding the potential for applications in office scenes and gaming hardware
Yiming He+4 more
wiley +1 more source
Particle saltation trajectories in supercritical open channel flows: Roughness effect
This study investigates single particle trajectories in supercritical open channel flows under different hydraulic and roughness conditions. Therefore, it helps to get a better understanding on the mechanics and prediction of bedrock incision and hydro‐abrasion occurring in steep bedrock rivers and hydraulic structures.
Dila Demiral+3 more
wiley +1 more source
FPGA Implementation of Elliptic Curve Cryptoprocessor for Perceptual Layer of the Internet of Things
Today’s developing era data and information security plays an important role in unsecured communication between Internet of Things (IoT) elements. In IoT, data are transmitted in plaintext for many reasons.
V. Kamalakannan, S. Tamilselvan
doaj +1 more source
More constructing pairing-friendly elliptic curves for cryptography [PDF]
The problem of constructing elliptic curves suitable for pairing applications has received a lot of attention. To solve this, we propose a variant algorithm of a known method by Brezing and Weng. We produce new families of parameters using our algorithm for pairing-friendly elliptic curves of embedding degree 8, and we actually compute some explicit ...
arxiv
Elligator : elliptic-curve points indistinguishable from uniform random strings [PDF]
Censorship-circumvention tools are in an arms race against censors. The censors study all traffic passing into and out of their controlled sphere, and try to disable censorship-circumvention tools without completely shutting down the Internet.
Bernstein, D.J.+3 more
core
Drinfeld modules may not be for isogeny based cryptography [PDF]
Elliptic curves play a prominent role in cryptography. For instance, the hardness of the elliptic curve discrete logarithm problem is a foundational assumption in public key cryptography.
Anand Kumar Narayanan, Antoine Joux
core
We present a new strong‐form meshless solver combined with the boundary condition‐enforced immersed boundary method for the numerical solution of the nonstationary, incompressible, viscous Navier–Stokes equations in their stream function‐vorticity (in 2D) and vector potential‐vorticity (in 3D) formulation.
George C. Bourantas+6 more
wiley +1 more source
Elliptic curves have a wide variety of applications in computational number theory such as elliptic curve cryptography, pairing based cryptography, primality tests, and integer factorization.
Keisuke Hakuta
doaj +1 more source
New algorithm for the discrete logarithm problem on elliptic curves [PDF]
A new algorithms for computing discrete logarithms on elliptic curves defined over finite fields is suggested. It is based on a new method to find zeroes of summation polynomials. In binary elliptic curves one is to solve a cubic system of Boolean equations.
arxiv