Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography [PDF]
Ghadah Aldabbagh +5 more
openalex +1 more source
From Droplet to Diagnosis: Spatio‐Temporal Pattern Recognition in Drying Biofluids
This article integrates machine learning (ML) with the spatio‐temporal evolution of biofluid droplets to reveal how drying and self‐assembly encode distinctive compositional fingerprints. By leveraging textural features and interpretable ML, it achieves robust classification of blood abnormalities with over 95% accuracy.
Anusuya Pal +2 more
wiley +1 more source
Lightweight Authentication Mechanism for Industrial IoT Environment Combining Elliptic Curve Cryptography and Trusted Token. [PDF]
Yang YS +5 more
europepmc +1 more source
New Digital Image Encryption Scheme based on Elliptic Curve Isogenies [PDF]
Due to the complexity of modern technological exchanges, the need of the security of the image remains till now a challenging problems. In this paper, we present a new encryption scheme based on a non-classical aspect of the elliptic curve cryptography ...
Bouaziz, S. (Samia) +2 more
core
A surrogate‐model‐based framework is proposed for combining high‐fidelity finite element method and efficient physics simulations to enable fast, accurate soft robot simulation for reinforcement learning, validated through sim‐to‐real experiments. Soft robotics holds immense promise for applications requiring adaptability and compliant interactions ...
Taehwa Hong +3 more
wiley +1 more source
FPGA Implementation for Elliptic Curve Cryptography Algorithm and Circuit with High Efficiency and Low Delay for IoT Applications. [PDF]
Wang D, Lin Y, Hu J, Zhang C, Zhong Q.
europepmc +1 more source
Distortion maps for genus two curves [PDF]
Distortion maps are a useful tool for pairing based cryptography. Compared with elliptic curves, the case of hyperelliptic curves of genus g > 1 is more complicated since the full torsion subgroup has rank 2g.
Galbraith, Steven D. +3 more
core +3 more sources
The design of the entire paper. Green part represents the bioinformatics analysis approach. Yellow part represents the ideas of animal experiment. Abstract Background Chronic obstructive pulmonary disease (COPD) is a type of chronic respiratory disease.
Xuejing Luan +5 more
wiley +1 more source
Hardware acceleration of number theoretic transform for zk‐SNARK
An FPGA‐based hardware accelerator with a multi‐level pipeline is designed to support the large‐bitwidth and large‐scale NTT tasks in zk‐SNARK. It can be flexibly scaled to different scales of FPGAs and has been equipped in the heterogeneous acceleration system with the help of HLS and OpenCL.
Haixu Zhao +6 more
wiley +1 more source
Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things. [PDF]
Zhao X, Li D, Li H.
europepmc +1 more source

