Results 51 to 60 of about 4,746 (306)
Rapid solidification in laser additive manufacturing facilitates the precipitation of metastable phases in aluminum alloys. These metastable phases significantly enhance the strength by forming a high‐volume fraction of precipitates with an order of magnitude reduced sizes and smaller interspacing, effectively impeding dislocation motion. Consequestly,
S. Mohadeseh Taheri‐Mousavi +10 more
wiley +1 more source
SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography
Many applications use asymmetric cryptography to secure communications between two parties. One of the main issues with asymmetric cryptography is the need for vast amounts of computation and storage.
Hisham N. Almajed, Ahmad S. Almogren
doaj +1 more source
Combined small subgroups and side-channel attack on elliptic curves with cofactor divisible by 2m [PDF]
Nowadays, alternative models of elliptic curves like Montgomery, Edwards, twisted Edwards, Hessian, twisted Hessian, Huff’s curves and many others are very popular and many people use them in cryptosystems which are based on elliptic curve cryptography ...
Michał Wrońska
doaj +1 more source
This work quantifies chirality through the continuous chirality measure (CCM). The CCM is correlated to a variety of properties: spin‐orbit field, orbital angular momentum, circular dichroism, absorption dissymmetry factor (gCD) and the circular photogalvanic effect.
Andrew Grieder, Shihao Tu, Yuan Ping
wiley +1 more source
Phase-Image-Encryption-Based Elliptic Curve and Double-Random-Phase Encoding
In this paper, we proposed an enhanced asymmetric cryptosystem scheme for image encryption using a combination of Elliptic Curve and Fourier transformations. Our proposed encryption and decryption process is highly secure with a smaller key size compared
Arabind Kumar, Sanjay Yadav, Tarul Garg
doaj +1 more source
A DSP Based POD Implementation for High Speed Multimedia Communications
In the cable network services, the audio/video entertainment contents should be protected from unauthorized copying, intercepting, and tampering. Point-of-deployment (POD) security module, proposed by OpenCableTM, allows viewers to receive secure cable ...
Chang Nian Zhang +3 more
doaj +1 more source
Secure Image Transmission Using Chaotic-Enhanced Elliptic Curve Cryptography
In this paper, a novel scheme for secure and real time image transmission is introduced. The scheme uses a block-based elliptic curve (BBEC) public key encryption as a first stage of encryption so it solves the key distribution and management problem of ...
Roayat Ismail Abdelfatah
doaj +1 more source
Enhanced Elliptic Curve Cryptography
Background/Objectives: Today’s Technological world Information Security is an essential for commercial and legal trading, secrecy, truthfulness and non-reputability. The Elliptic Curve Cryptography (ECC) has become one of the latest trends in the field of Public-Key Cryptography (PKC). ECC promises a faster, efficient and more secured.
S. Thiraviya Regina Rajam +1 more
openaire +2 more sources
Applications of QSPR and Machine Learning in Molecular Photonics
Quantitative structureproperty relationships (QSPR) and machine learning (ML) are transforming photochemistry by enabling pre‐synthetic screening of photoactive molecules. This review outlines advances in data‐driven discovery of optical materials and functional dyes, identifies effective descriptors and models for photophysical processes, and provides
Andrey A. Buglak +2 more
wiley +1 more source
Elliptic Curves and Cryptography
Durch die zunehmende Digitalisierung, und insbesondere dem sogenannten "Internet of Things", ist der Bedarf an zuverlässigen kryptografischen Verfahren nicht nur für Behörden, sondern auch für Privatpersonen wichtig geworden. In den letzten Jahrzehnten wurde eine Vielzahl an unterschiedlichsten Lösungen präsentiert.
openaire

