Results 71 to 80 of about 24,925 (334)

Terahertz Volume Plasmon‐Polariton Modulation in All‐Dielectric Hyperbolic Metamaterials

open access: yesAdvanced Optical Materials, EarlyView.
THz volume plasmon‐polariton (VPP) propagation through plasmon‐based hyperbolic metamaterials, made of alternating layers of doped and undoped III‐V semiconductors. Abstract The development of plasmonics and related applications in the terahertz range faces limitations due to the intrinsic high electron density of the standard metals.
Stefano Campanaro   +3 more
wiley   +1 more source

Enhanced Elliptic Curve Cryptography

open access: yesIndian Journal of Science and Technology, 2015
Background/Objectives: Today’s Technological world Information Security is an essential for commercial and legal trading, secrecy, truthfulness and non-reputability. The Elliptic Curve Cryptography (ECC) has become one of the latest trends in the field of Public-Key Cryptography (PKC). ECC promises a faster, efficient and more secured.
S. Thiraviya Regina Rajam   +1 more
openaire   +1 more source

Phase-Image-Encryption-Based Elliptic Curve and Double-Random-Phase Encoding

open access: yesEngineering Proceedings
In this paper, we proposed an enhanced asymmetric cryptosystem scheme for image encryption using a combination of Elliptic Curve and Fourier transformations. Our proposed encryption and decryption process is highly secure with a smaller key size compared
Arabind Kumar, Sanjay Yadav, Tarul Garg
doaj   +1 more source

Combined small subgroups and side-channel attack on elliptic curves with cofactor divisible by 2m [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2019
Nowadays, alternative models of elliptic curves like Montgomery, Edwards, twisted Edwards, Hessian, twisted Hessian, Huff’s curves and many others are very popular and many people use them in cryptosystems which are based on elliptic curve cryptography ...
Michał Wrońska
doaj   +1 more source

De Novo Gene Transcription of Connexin Mediates Cytoplasmic Fluid Exchange and Flocking Transitions in Physiological and Cancerous Epithelial Systems

open access: yesAdvanced Science, EarlyView.
EGF‐induced de novo transcription of connexins Cx26 and Cx31 promotes flocking behavior that fluidizes epithelia and enables coordinated collective migration. Connexin‐driven cytoplasmic exchange mechanistically links growth‐factor signaling to invasive dynamics.
Hind Abdo   +18 more
wiley   +1 more source

Algorithm based on Booth's Encoding Pattern for Fast Scalar Point Multiplication for ECC in Wireless Sensor Networks [PDF]

open access: yes, 2011
With the rapid increase of small devices and its usage, a better suitable security providing mechanism must be incorported keeping the resource constraints of the devices in mind. Elliptic Curve Cryptography (ECC) serves the best and highly suitable for
Levaka, Ravi Teja Reddy
core  

Allelic Variation in Maize Malate Dehydrogenase 7 Shapes Promoter Methylation and Banded Leaf and Sheath Blight Resistance

open access: yesAdvanced Science, EarlyView.
In this study maize chloroplastic malate dehydrogenase7 (ZmMDH7), is identified as a Rhizoctonia solani resistance gene in maize. ZmMDH7 is regulated by transcription factor ZmWRKY44 via pathogens challenge to elevate mitochondrial ROS and SA signaling pathway.
Luyang Wei   +9 more
wiley   +1 more source

Secure Image Transmission Using Chaotic-Enhanced Elliptic Curve Cryptography

open access: yesIEEE Access, 2020
In this paper, a novel scheme for secure and real time image transmission is introduced. The scheme uses a block-based elliptic curve (BBEC) public key encryption as a first stage of encryption so it solves the key distribution and management problem of ...
Roayat Ismail Abdelfatah
doaj   +1 more source

Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors [PDF]

open access: yes, 2015
Resource constraints in smart devices demand an efficient cryptosystem that allows for low power and memory consumption. This has led to popularity of comparatively efficient Elliptic curve cryptog-raphy (ECC).
Malik, Yasir
core   +1 more source

Refinements of Miller's Algorithm over Weierstrass Curves Revisited

open access: yes, 2011
In 1986 Victor Miller described an algorithm for computing the Weil pairing in his unpublished manuscript. This algorithm has then become the core of all pairing-based cryptosystems. Many improvements of the algorithm have been presented.
Le, Duc-Phong, Liu, Chao-Liang
core   +1 more source

Home - About - Disclaimer - Privacy