Results 51 to 60 of about 24,382 (331)
Magnetic Unclonable Functions Leveraging Remanence and Anhysteretic States
A micrometric array of magnetic pillars provides a stable and unclonable hardware for generating cryptographic keys. From a single device, the ability is demonstrated to produce a 470‐bit key while also offering a reconfigurable mode of operation.
Alessandro Magni +6 more
wiley +1 more source
Elliptic Curve Cryptography with Machine Learning
Elliptic Curve Cryptography (ECC) is a technology based on the arithmetic of elliptic curves used to build strong and efficient cryptosystems and infrastructures. Several ECC systems, such as the Diffie–Hellman key exchange and the Elliptic Curve Digital
Jihane Jebrane +3 more
doaj +1 more source
Isogenies of Elliptic Curves: A Computational Approach [PDF]
Isogenies, the mappings of elliptic curves, have become a useful tool in cryptology. These mathematical objects have been proposed for use in computing pairings, constructing hash functions and random number generators, and analyzing the reducibility of ...
Shumow, Daniel
core +2 more sources
Bioinspired Design of a Wet‐Adhesive Cornea Glue Based on Recombinant Human Protein Networks
Natures protein‐based high performance materials e.g. elastin, silk and muscle proteins have been mimicked by a new protein‐hybrid material based on redesigned human partial sequences only, showing high wet‐adhesiveness and elasticity for biomedical applications.
Anna Resch +17 more
wiley +1 more source
Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures. [PDF]
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical ...
Maocai Wang +4 more
doaj +1 more source
Biometric identity-based cryptography for e-Government environment [PDF]
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core +1 more source
Ultrathin AlOxHy interlayers between aluminum films and polymer substrates significantly improve electro‐mechanical properties of flexible thin film systems. By precisely controlling interlayer thickness using atomic layer deposition, this study identifies an optimal interlayer thickness of 5–10 nm that enhances ductility and delays cracking.
Johanna Byloff +9 more
wiley +1 more source
An exploration of affine group laws for elliptic curves
Several forms of elliptic curves are suggested for an efficient implementation of Elliptic Curve Cryptography. However, a complete description of the group law has not appeared in the literature for most popular forms.
Hisil Huseyin +3 more
doaj +1 more source
A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware
Cryptography is considered indispensable among security measures applied to data concerning insecure means of transmission. Among various existent algorithms on asymmetric cryptography, we may cite Elliptic Curve Cryptography (ECC), which has been widely
Arielle Verri Lucca +5 more
doaj +1 more source
This work presents a novel, dynamically perfused, configurable microfluidic system for epidermis‐only (E and full‐thickness skin (FT SoC) growth, emulating human skin structure and barrier function. Upon TiO2 nanoparticle exposure, the system reveals compromised barrier integrity, reduced metabolic activity, increased permeability, and chemokine‐driven
Samantha Costa +7 more
wiley +1 more source

