Results 41 to 50 of about 24,382 (331)

Model Proyeksi (X/Z2, Y/Z2) pada Kurva Hesian secara Paralel Menggunakan Mekanisme Kriptografi Kurva Eliptik [PDF]

open access: yes, 2012
MODEL PROYEKSI (X/Z2, Y/Z2) PADA KURVA HESIAN SECARA PARALEL MENGGUNAKAN MEKANISME KRIPTOGRAFI KURVA ELIPTIKABSTRAK Suatu kunci publik, Elliptic Curve Cryptography (ECC) dikenal sebagai algoritma yang paling aman yang digunakan untuk memproteksi ...
Weku, W. (Winsy)
core  

LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments

open access: yes, 2008
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core   +3 more sources

Families of fast elliptic curves from Q-curves [PDF]

open access: yes, 2013
We construct new families of elliptic curves over \(\FF_{p^2}\) with efficiently computable endomorphisms, which can be used to accelerate elliptic curve-based cryptosystems in the same way as Gallant-Lambert-Vanstone (GLV) and Galbraith-Lin-Scott (GLS ...
Smith, Benjamin
core   +7 more sources

Magnetic‐Field Tuning of the Spin Dynamics in the Quasi‐2D Van der Waals Antiferromagnet CuCrP2S6

open access: yesAdvanced Functional Materials, EarlyView.
This study reveals 2D character of the spin dynamics in CuCrP2S6, as well as complex field dependence of collective excitations in the antiferromagnetically ordered state. Their remarkable tuning from the antiferromagnetic to the ferromagnetic type with magnetic field, together with the non‐degeneracy of the magnon gaps favorable for the induction of ...
Joyal John Abraham   +16 more
wiley   +1 more source

Implementasi Algoritma ECDSA untuk Pengamanan E-Mail (Verifikasi Keaslian Pesan) [PDF]

open access: yes, 2010
This final project is discussed about implementation of digital signature on email delivery with java programming language. Digital signature is one of the cryptographic security services that provide assurance to the recipient of the message (receiver).
Prabowo, Pualam Sendi Agung   +2 more
core  

Isogeny volcanoes

open access: yes, 2013
The remarkable structure and computationally explicit form of isogeny graphs of elliptic curves over a finite field has made them an important tool for computational number theorists and practitioners of elliptic curve cryptography. This expository paper
Sutherland, Andrew V.
core   +1 more source

Peptide Sequencing With Single Acid Resolution Using a Sub‐Nanometer Diameter Pore

open access: yesAdvanced Functional Materials, EarlyView.
To sequence a single molecule of Aβ1−42–sodium dodecyl sulfate (SDS), the aggregate is forced through a sub‐nanopore 0.4 nm in diameter spanning a 4.0 nm thick membrane. The figure is a visual molecular dynamics (VMD) snapshot depicting the translocation of Aβ1−42–SDS through the pore; only the peptide, the SDS, the Na+ (yellow/green) and Cl− (cyan ...
Apurba Paul   +8 more
wiley   +1 more source

Secure and Efficient RNS Approach for Elliptic Curve Cryptography [PDF]

open access: yes, 2016
Scalar multiplication, the main operation in elliptic curve cryptographic protocols, is vulnerable to side-channel (SCA) and fault injection (FA) attacks.
Batina, Lejla   +3 more
core  

A Comparative Analysis of Plasmonic and Dielectric Metasurface Sensing Platforms Powered by Bound States in the Continuum

open access: yesAdvanced Functional Materials, EarlyView.
This work reveals a fundamental trade‐off between plasmonic and dielectric metasurfaces for molecular sensing. A clear performance crossover is identified: dielectric metasurfaces excel in air, while plasmonic metasurfaces dominate in lossy solvents. These results establish design rules for infrared metasurface sensors and enable optimized performance ...
Tao Jiang   +8 more
wiley   +1 more source

Decrypting the Link Between Elliptic Primes and Twin Primes [PDF]

open access: yes, 2017
From Caesar’s cipher to Germany’s enigma machine to modern day cryptosytems, cryptography spans throughout history. Methods of encryption have evolved over hundreds of years and continue to evolve as computational efficiency increases.
Babinkostova, Liljana, (Mentor)   +8 more
core   +1 more source

Home - About - Disclaimer - Privacy