Results 151 to 160 of about 24,925 (334)
Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data
Background: Given the vast amount of data generated daily on the Internet, numerous cryptosystems have been developed to ensure data confidentiality using symmetric, asymmetric, or hybrid encryption techniques. However, many of these systems suffer from
Joel Kinganga +2 more
doaj +1 more source
Abstract Actinopterygii is a major extant vertebrate group, but limited data are available for its earliest members. Here we investigate the morphology of Devonian actinopterygians, focusing on the lower jaw. We use X‐ray computed tomography (XCT) to provide comprehensive descriptions of the mandibles of 19 species, which span the whole of the Devonian
Ben Igielman +11 more
wiley +1 more source
Abstract The anatomical description of the hourglass dolphin (Cephalorhynchus cruciger) and the spectacled porpoise (Phocoena dioptrica) remains largely unexplored, due to limited specimen availability and preservation challenges. This study employed digital imaging techniques, conventional histology, and computed tomography to provide visualization of
Jean‐Marie Graïc +26 more
wiley +1 more source
Trabecular bone ontogeny of the human talus
Abstract Studies of trabecular ontogeny may provide insight into the factors that drive healthy bone development. There is a growing understanding of how the juvenile skeleton responds to these influences; however, gaps in our knowledge remain. This study aims to identify ontogenetic trabecular patterns and regional changes during development within ...
Rebecca A. G. Reid +2 more
wiley +1 more source
iTrust-A Trustworthy and Efficient Mapping Scheme in Elliptic Curve Cryptography. [PDF]
Almajed H, Almogren A, Alabdulkareem M.
europepmc +1 more source
Abstract The study of morphological evolution is fundamentally tied to ontogeny, yet studies of these heterochronic processes in the fossil record are rare. Fossils belonging to an ontogenetic series are difficult to assign to an ontogenetic stage due to inconsistent proxies for skeletal ages, challenging to taxonomically assign due to morphological ...
Erika R. Goldsmith, Michelle R. Stocker
wiley +1 more source
У статті детально досліджуються математичні аспекти еліптичних кривих, зокрема операції додавання та подвоєння точок, які є основними операціями для побудови криптографічних алгоритмів. Зосереджено увагу на властивостях еліптичних кривих над скінченними полями, що робить їх придатними для реалізації стійких криптографічних методів, таких як ECDSA ...
openaire +1 more source
3D anatomical atlas of the heads of male and female adult Chamaeleo calyptratus
The veiled chameleon is a model organism in reptile development research. Utilizing contrast‐enhanced microCT and deep learning segmentation models, we have generated the first digital atlases of the skull, nervous system, cranial muscles and hyolingual muscles.
Alice Leavey +3 more
wiley +1 more source
Hyper-and-elliptic-curve cryptography [PDF]
Daniel J. Bernstein, Tanja Lange
openalex +1 more source

