Results 61 to 70 of about 24,925 (334)

Error analysis and detection procedures for elliptic curve cryptography

open access: yesAin Shams Engineering Journal, 2019
In this paper, a fault detection scheme is introduced with the ability to perform with increased protection and reliability of the Elliptic Curve Cryptography (ECC) in realistic environments at a competitive price point.
Naglaa F. Saudy   +2 more
doaj   +1 more source

A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware

open access: yesJournal of Sensor and Actuator Networks, 2020
Cryptography is considered indispensable among security measures applied to data concerning insecure means of transmission. Among various existent algorithms on asymmetric cryptography, we may cite Elliptic Curve Cryptography (ECC), which has been widely
Arielle Verri Lucca   +5 more
doaj   +1 more source

Development of Laterally Graded X‐Ray Multilayer Optics

open access: yesAdvanced Materials Technologies, EarlyView.
This work presents the development of laterally graded X‐ray multilayer optics with both constant and variable lateral gradients. By precisely controlling substrate speed profiles and mask design, these multilayers achieve highly accurate lateral gradients and excellent sagittal thickness uniformity, making them ideal for spectroscopy application at ...
Arindam Majhi   +11 more
wiley   +1 more source

End‐to‐End Sensing Systems for Breast Cancer: From Wearables for Early Detection to Lab‐Based Diagnosis Chips

open access: yesAdvanced Materials Technologies, EarlyView.
This review explores advances in wearable and lab‐on‐chip technologies for breast cancer detection. Covering tactile, thermal, ultrasound, microwave, electrical impedance tomography, electrochemical, microelectromechanical, and optical systems, it highlights innovations in flexible electronics, nanomaterials, and machine learning.
Neshika Wijewardhane   +4 more
wiley   +1 more source

Efficient scalar multiplication of ECC using SMBR and fast septuple formula for IoT

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
In order to solve the problem between low power of Internet of Things devices and the high cost of cryptography, lightweight cryptography is required. The improvement of the scalar multiplication can effectively reduce the complexity of elliptic curve ...
Chong Guo, Bei Gong
doaj   +1 more source

Two‐Photon Polymerized Microvascular Environments for Multicellular Modeling of the Blood–Brain Tumor Barrier

open access: yesAdvanced Materials Technologies, EarlyView.
Modeling the blood–brain tumor barrier is challenging due to complex interactions between brain microvasculature and glioma cells. We present two‐photon polymerized 3D micro‐porous capillary‐like structures that support endothelial alignment, cytoskeletal organization, and pericyte‐endothelial‐glioma tri‐cultures.
Nastaran Barin   +9 more
wiley   +1 more source

A DSP Based POD Implementation for High Speed Multimedia Communications

open access: yesEURASIP Journal on Advances in Signal Processing, 2002
In the cable network services, the audio/video entertainment contents should be protected from unauthorized copying, intercepting, and tampering. Point-of-deployment (POD) security module, proposed by OpenCableTM, allows viewers to receive secure cable ...
Chang Nian Zhang   +3 more
doaj   +1 more source

IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY

open access: yesMalaysian Journal of Computing, 2021
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker.
Md Nizam Udin   +5 more
doaj   +1 more source

Cryptography: Mathematical Advancements on Cyber Security [PDF]

open access: yes, 2019
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core   +1 more source

Securing the Data in Clouds with Hyperelliptic Curve Cryptography

open access: yes, 2014
In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility,
Agrawal, Tanmay   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy