Results 31 to 40 of about 177,129 (337)

Perceived safety in community and service settings among young adults experiencing homelessness: Differences by sexual and gender identity

open access: yesAmerican Journal of Community Psychology, Volume 70, Issue 3-4, Page 340-351, December 2022., 2022
Abstract Homelessness poses risks to the health and safety of young adults; particularly among sexual and gender minority (SGM) young adults. The current study sought to better understand service use and perceived safety in community and service settings among SGM and cisgender heterosexual (cis‐hetero) young adults experiencing homelessness. Data come
Graham DiGuiseppi   +4 more
wiley   +1 more source

Tissue mosaicism, FMR1 expression and intellectual functioning in males with fragile X syndrome

open access: yesAmerican Journal of Medical Genetics Part A, Volume 191, Issue 2, Page 357-369, February 2023., 2023
Abstract Fragile X syndrome (FXS) is caused by hypermethylation of the FMR1 promoter due to the full mutation expansion (full mutation [FM]: CGG ≥ 200 repeats) and silencing of FMR1. Assessment of mosaicism for active‐unmethylated alleles has prognostic utility.
Emma K. Baker   +17 more
wiley   +1 more source

Encryption of Data using Elliptic Curve over Finite fields [PDF]

open access: yesInternational Journal of Distributed and Parallel Sysstems(IJDPS) Vol.3 No.1 January 2012, 2012
Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. Public-key encryption schemes are secure only if the authenticity of the public-key is assured. Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptography (ECC) schemes including key exchange, encryption and digital ...
arxiv   +1 more source

Adding Level Structure to Supersingular Elliptic Curve Isogeny Graphs [PDF]

open access: yes, 2022
In this paper, we add the information of level structure to supersingular elliptic curves and study these objects with the motivation of isogeny-based cryptography. Supersingular elliptic curves with level structure map to Eichler orders in a quaternion algebra, just as supersingular elliptic curves map to maximal orders in a quaternion algebra via the
arxiv   +1 more source

Antler tine homologies and cervid systematics: A review of past and present controversies with special emphasis on Elaphurus davidianus

open access: yesThe Anatomical Record, Volume 306, Issue 1, Page 5-28, January 2023., 2023
Abstract Antlers are the most conspicuous trait of cervids and have been used in the past to establish a classification of their fossil and living representatives. Since the availability of molecular data, morphological characters have generally become less important for phylogenetic reconstructions.
Nicola S. Heckeberg   +2 more
wiley   +1 more source

Comparing AI Algorithms for Optimizing Elliptic Curve Cryptography Parameters in e-Commerce Integrations: A Pre-Quantum Analysis [PDF]

open access: yesInt. J. Adv. Comput. Sci. Appl. (IJACSA), Vol. 15, No. 6, 2024, pp. 1539-1553, 2023
This paper presents a comparative analysis between the Genetic Algorithm (GA) and Particle Swarm Optimization (PSO), two vital artificial intelligence algorithms, focusing on optimizing Elliptic Curve Cryptography (ECC) parameters. These encompass the elliptic curve coefficients, prime number, generator point, group order, and cofactor.
arxiv   +1 more source

Endostructural and periosteal growth of the human humerus

open access: yesThe Anatomical Record, Volume 306, Issue 1, Page 60-78, January 2023., 2023
Abstract The growth and development of long bones are of considerable interests in the fields of comparative anatomy and palaeoanthropology, as evolutionary changes and adaptations to specific physical activity patterns are expected to be revealed during bone ontogeny.
Thomas George O'Mahoney   +3 more
wiley   +1 more source

Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm

open access: yesEngineering Proceedings, 2023
Elliptic-curve cryptography (ECC) has become a robust cryptographic technique that ensures secure data transmission with comparatively small key sizes.
Sanjay Kumar, Deepmala Sharma
doaj   +1 more source

On Pseudo-Random Number Generators Using Elliptic Curves and Chaotic Systems [PDF]

open access: yes, 2023
Elliptic Curve Cryptography (ECC) is a relatively recent branch of cryptography which is based on the arithmetic on elliptic curves and security of the hardness of the Elliptic Curve Discrete Logarithm Problem (ECDLP).
Kotulski, Zbigniew, Reyad, Omar
core   +1 more source

On the Discrete Logarithm Problem for elliptic curves over local fields [PDF]

open access: yesarXiv, 2023
The Discrete Logarithm Problem (DLP) for elliptic curves has been extensively studied since, for instance, it is the core of the security of cryptosystems like Elliptic Curve Cryptography (ECC). In this paper, we present an attack to the DLP for elliptic curves based on its connection to the problem of lifting, by using the exponential map for elliptic
arxiv  

Home - About - Disclaimer - Privacy