Results 61 to 70 of about 24,925 (334)
Error analysis and detection procedures for elliptic curve cryptography
In this paper, a fault detection scheme is introduced with the ability to perform with increased protection and reliability of the Elliptic Curve Cryptography (ECC) in realistic environments at a competitive price point.
Naglaa F. Saudy +2 more
doaj +1 more source
A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware
Cryptography is considered indispensable among security measures applied to data concerning insecure means of transmission. Among various existent algorithms on asymmetric cryptography, we may cite Elliptic Curve Cryptography (ECC), which has been widely
Arielle Verri Lucca +5 more
doaj +1 more source
Development of Laterally Graded X‐Ray Multilayer Optics
This work presents the development of laterally graded X‐ray multilayer optics with both constant and variable lateral gradients. By precisely controlling substrate speed profiles and mask design, these multilayers achieve highly accurate lateral gradients and excellent sagittal thickness uniformity, making them ideal for spectroscopy application at ...
Arindam Majhi +11 more
wiley +1 more source
This review explores advances in wearable and lab‐on‐chip technologies for breast cancer detection. Covering tactile, thermal, ultrasound, microwave, electrical impedance tomography, electrochemical, microelectromechanical, and optical systems, it highlights innovations in flexible electronics, nanomaterials, and machine learning.
Neshika Wijewardhane +4 more
wiley +1 more source
Efficient scalar multiplication of ECC using SMBR and fast septuple formula for IoT
In order to solve the problem between low power of Internet of Things devices and the high cost of cryptography, lightweight cryptography is required. The improvement of the scalar multiplication can effectively reduce the complexity of elliptic curve ...
Chong Guo, Bei Gong
doaj +1 more source
Modeling the blood–brain tumor barrier is challenging due to complex interactions between brain microvasculature and glioma cells. We present two‐photon polymerized 3D micro‐porous capillary‐like structures that support endothelial alignment, cytoskeletal organization, and pericyte‐endothelial‐glioma tri‐cultures.
Nastaran Barin +9 more
wiley +1 more source
A DSP Based POD Implementation for High Speed Multimedia Communications
In the cable network services, the audio/video entertainment contents should be protected from unauthorized copying, intercepting, and tampering. Point-of-deployment (POD) security module, proposed by OpenCableTM, allows viewers to receive secure cable ...
Chang Nian Zhang +3 more
doaj +1 more source
IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker.
Md Nizam Udin +5 more
doaj +1 more source
Cryptography: Mathematical Advancements on Cyber Security [PDF]
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core +1 more source
Securing the Data in Clouds with Hyperelliptic Curve Cryptography
In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility,
Agrawal, Tanmay +3 more
core +1 more source

