Results 51 to 60 of about 24,925 (334)

Decrypting the Link Between Elliptic Primes and Twin Primes [PDF]

open access: yes, 2017
From Caesar’s cipher to Germany’s enigma machine to modern day cryptosytems, cryptography spans throughout history. Methods of encryption have evolved over hundreds of years and continue to evolve as computational efficiency increases.
Babinkostova, Liljana, (Mentor)   +8 more
core   +1 more source

A Synovium‐on‐Chip Platform to Study Multicellular Interactions in Arthritis

open access: yesAdvanced Healthcare Materials, EarlyView.
The Synovium‐on‐Chip comprises a thin microporous PDMS membrane to support co‐culture of fibroblast‐like synoviocytes (FLS), THP‐1‐derived macrophages, and endothelial cells, enabling real‐time analysis of synovial‐vascular interactions. FLS migration through the pores drives endothelial remodeling, while TNF‐α stimulation induces robust inflammatory ...
Laurens R. Spoelstra   +8 more
wiley   +1 more source

Secure Elliptic Curves in Cryptography [PDF]

open access: yes, 2017
Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of elliptic curves. In the short life of ECC, most standards have proposed curves defined over prime finite fields using the short Weierstrass form. However, some researchers have started to propose as a more secure alternative the use of Edwards and ...
Gayoso Martínez, Victor   +2 more
openaire   +2 more sources

Isogenies of Elliptic Curves: A Computational Approach [PDF]

open access: yes, 2009
Isogenies, the mappings of elliptic curves, have become a useful tool in cryptology. These mathematical objects have been proposed for use in computing pairings, constructing hash functions and random number generators, and analyzing the reducibility of ...
Shumow, Daniel
core   +2 more sources

Opportunities of Semiconducting Oxide Nanostructures as Advanced Luminescent Materials in Photonics

open access: yesAdvanced Materials, EarlyView.
The review discusses the challenges of wide and ultrawide bandgap semiconducting oxides as a suitable material platform for photonics. They offer great versatility in terms of tuning microstructure, native defects, doping, anisotropy, and micro‐ and nano‐structuring. The review focuses on their light emission, light‐confinement in optical cavities, and
Ana Cremades   +7 more
wiley   +1 more source

An exploration of affine group laws for elliptic curves

open access: yesJournal of Mathematical Cryptology, 2011
Several forms of elliptic curves are suggested for an efficient implementation of Elliptic Curve Cryptography. However, a complete description of the group law has not appeared in the literature for most popular forms.
Hisil Huseyin   +3 more
doaj   +1 more source

Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures. [PDF]

open access: yesPLoS ONE, 2016
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical ...
Maocai Wang   +4 more
doaj   +1 more source

Families of fast elliptic curves from Q-curves [PDF]

open access: yes, 2013
We construct new families of elliptic curves over \(\FF_{p^2}\) with efficiently computable endomorphisms, which can be used to accelerate elliptic curve-based cryptosystems in the same way as Gallant-Lambert-Vanstone (GLV) and Galbraith-Lin-Scott (GLS ...
Smith, Benjamin
core   +7 more sources

Spectral Tuning of Hyperbolic Shear Polaritons in Monoclinic Gallium Oxide via Isotopic Substitution

open access: yesAdvanced Materials, EarlyView.
Spectral tuning of highly directional hyperbolic shear polaritons is realized via isotopic substitution of 16O to 18O in monoclinic β$\beta$‐phase gallium oxide. A red‐shift of almost 40 cm−1 is experimentally demonstrated with near‐field imaging, corroborated by the permittivity change extracted from far‐field experiments and density functional theory.
Giulia Carini   +28 more
wiley   +1 more source

RFID security authentication scheme based on Montgomery-form elliptic curve cryptography

open access: yesDianxin kexue, 2016
For the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication,privacy protection and forward security,a RFID security authentication scheme based on ...
Wumei ZHANG
doaj   +2 more sources

Home - About - Disclaimer - Privacy