Results 51 to 60 of about 24,382 (331)

Magnetic Unclonable Functions Leveraging Remanence and Anhysteretic States

open access: yesAdvanced Functional Materials, EarlyView.
A micrometric array of magnetic pillars provides a stable and unclonable hardware for generating cryptographic keys. From a single device, the ability is demonstrated to produce a 470‐bit key while also offering a reconfigurable mode of operation.
Alessandro Magni   +6 more
wiley   +1 more source

Elliptic Curve Cryptography with Machine Learning

open access: yesCryptography
Elliptic Curve Cryptography (ECC) is a technology based on the arithmetic of elliptic curves used to build strong and efficient cryptosystems and infrastructures. Several ECC systems, such as the Diffie–Hellman key exchange and the Elliptic Curve Digital
Jihane Jebrane   +3 more
doaj   +1 more source

Isogenies of Elliptic Curves: A Computational Approach [PDF]

open access: yes, 2009
Isogenies, the mappings of elliptic curves, have become a useful tool in cryptology. These mathematical objects have been proposed for use in computing pairings, constructing hash functions and random number generators, and analyzing the reducibility of ...
Shumow, Daniel
core   +2 more sources

Bioinspired Design of a Wet‐Adhesive Cornea Glue Based on Recombinant Human Protein Networks

open access: yesAdvanced Functional Materials, EarlyView.
Natures protein‐based high performance materials e.g. elastin, silk and muscle proteins have been mimicked by a new protein‐hybrid material based on redesigned human partial sequences only, showing high wet‐adhesiveness and elasticity for biomedical applications.
Anna Resch   +17 more
wiley   +1 more source

Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures. [PDF]

open access: yesPLoS ONE, 2016
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical ...
Maocai Wang   +4 more
doaj   +1 more source

Biometric identity-based cryptography for e-Government environment [PDF]

open access: yes, 2014
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core   +1 more source

From Mechanics to Electronics: Influence of ALD Interlayers on the Multiaxial Electro‐Mechanical Behavior of Metal–Oxide Bilayers

open access: yesAdvanced Functional Materials, EarlyView.
Ultrathin AlOxHy interlayers between aluminum films and polymer substrates significantly improve electro‐mechanical properties of flexible thin film systems. By precisely controlling interlayer thickness using atomic layer deposition, this study identifies an optimal interlayer thickness of 5–10 nm that enhances ductility and delays cracking.
Johanna Byloff   +9 more
wiley   +1 more source

An exploration of affine group laws for elliptic curves

open access: yesJournal of Mathematical Cryptology, 2011
Several forms of elliptic curves are suggested for an efficient implementation of Elliptic Curve Cryptography. However, a complete description of the group law has not appeared in the literature for most popular forms.
Hisil Huseyin   +3 more
doaj   +1 more source

A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware

open access: yesJournal of Sensor and Actuator Networks, 2020
Cryptography is considered indispensable among security measures applied to data concerning insecure means of transmission. Among various existent algorithms on asymmetric cryptography, we may cite Elliptic Curve Cryptography (ECC), which has been widely
Arielle Verri Lucca   +5 more
doaj   +1 more source

A Novel Microfluidic System for 3D Epidermis and Full‐Thickness Skin Growth for Nanoparticle Safety Assessment

open access: yesAdvanced Healthcare Materials, EarlyView.
This work presents a novel, dynamically perfused, configurable microfluidic system for epidermis‐only (E and full‐thickness skin (FT SoC) growth, emulating human skin structure and barrier function. Upon TiO2 nanoparticle exposure, the system reveals compromised barrier integrity, reduced metabolic activity, increased permeability, and chemokine‐driven
Samantha Costa   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy