Results 31 to 40 of about 4,746 (306)

Magnetic‐Field Tuning of the Spin Dynamics in the Quasi‐2D Van der Waals Antiferromagnet CuCrP2S6

open access: yesAdvanced Functional Materials, EarlyView.
This study reveals 2D character of the spin dynamics in CuCrP2S6, as well as complex field dependence of collective excitations in the antiferromagnetically ordered state. Their remarkable tuning from the antiferromagnetic to the ferromagnetic type with magnetic field, together with the non‐degeneracy of the magnon gaps favorable for the induction of ...
Joyal John Abraham   +16 more
wiley   +1 more source

Confinement Driven Spin‐Texture Evolution in Directly Written Nanomagnets

open access: yesAdvanced Functional Materials, EarlyView.
Spin‐texture is directly written by triggering lattice ordering locally at the nanoscale. Geometric confinement drives the formation of spin‐textures such as Néel walls with perpendicular core spins, essential for technological applications. Abstract In low‐dimensional magnetic structures, magnetostatic energy minimization yields a uniform spin‐texture,
Md. Shadab Anwar   +11 more
wiley   +1 more source

Implementasi dan Pengukuran Kinerja Operasi Aritmatika Finite Field Berbasis Polinomial Biner

open access: yesJuTISI (Jurnal Teknik Informatika dan Sistem Informasi), 2015
Cryptography is one of the security techniques that secure information confidentiality and information integrity while electronic transaction processing.
Wenny Franciska Senjaya, Budi Rahardjo
doaj   +1 more source

A survey on elliptic curve cryptography [PDF]

open access: yesApplied Mathematical Sciences, 2014
Cryptography is an evolving field that research into discreet mathematical equation that is representable by computer algorithm for providing message condentiality. The scheme has been widely used by nation-states, corporates and individual who seeks privacy for data in storage and during transmission. This paper provides a ground up survey on elliptic
openaire   +2 more sources

Peptide Sequencing With Single Acid Resolution Using a Sub‐Nanometer Diameter Pore

open access: yesAdvanced Functional Materials, EarlyView.
To sequence a single molecule of Aβ1−42–sodium dodecyl sulfate (SDS), the aggregate is forced through a sub‐nanopore 0.4 nm in diameter spanning a 4.0 nm thick membrane. The figure is a visual molecular dynamics (VMD) snapshot depicting the translocation of Aβ1−42–SDS through the pore; only the peptide, the SDS, the Na+ (yellow/green) and Cl− (cyan ...
Apurba Paul   +8 more
wiley   +1 more source

Elliptic Curve Cryptography with Machine Learning

open access: yesCryptography
Elliptic Curve Cryptography (ECC) is a technology based on the arithmetic of elliptic curves used to build strong and efficient cryptosystems and infrastructures. Several ECC systems, such as the Diffie–Hellman key exchange and the Elliptic Curve Digital
Jihane Jebrane   +3 more
doaj   +1 more source

Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures. [PDF]

open access: yesPLoS ONE, 2016
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical ...
Maocai Wang   +4 more
doaj   +1 more source

A Comparative Analysis of Plasmonic and Dielectric Metasurface Sensing Platforms Powered by Bound States in the Continuum

open access: yesAdvanced Functional Materials, EarlyView.
This work reveals a fundamental trade‐off between plasmonic and dielectric metasurfaces for molecular sensing. A clear performance crossover is identified: dielectric metasurfaces excel in air, while plasmonic metasurfaces dominate in lossy solvents. These results establish design rules for infrared metasurface sensors and enable optimized performance ...
Tao Jiang   +8 more
wiley   +1 more source

A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware

open access: yesJournal of Sensor and Actuator Networks, 2020
Cryptography is considered indispensable among security measures applied to data concerning insecure means of transmission. Among various existent algorithms on asymmetric cryptography, we may cite Elliptic Curve Cryptography (ECC), which has been widely
Arielle Verri Lucca   +5 more
doaj   +1 more source

Magnetic Unclonable Functions Leveraging Remanence and Anhysteretic States

open access: yesAdvanced Functional Materials, EarlyView.
A micrometric array of magnetic pillars provides a stable and unclonable hardware for generating cryptographic keys. From a single device, the ability is demonstrated to produce a 470‐bit key while also offering a reconfigurable mode of operation.
Alessandro Magni   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy