Results 71 to 80 of about 4,746 (306)

Metrics on the Sets of Nonsupersingular Elliptic Curves in Simplified Weierstrass Form over Finite Fields of Characteristic Two

open access: yesInternational Journal of Mathematics and Mathematical Sciences, 2015
Elliptic curves have a wide variety of applications in computational number theory such as elliptic curve cryptography, pairing based cryptography, primality tests, and integer factorization.
Keisuke Hakuta
doaj   +1 more source

Biomimetic Thermal Safety Strategies in Batteries for Electric Vehicles: from Biological Principles to Engineering Approaches

open access: yesAdvanced Science, EarlyView.
Biological principles derived from natural structures and functions inspire novel biomimetic strategies for battery thermal safety. This review summarizes applications of biomimetic concepts in preventing thermal runaway, highlighting design strategies that enhance thermal safety protection.
Weifeng Li   +7 more
wiley   +1 more source

Super‐Resolution Compatible DNA Labeling Technique Reveals Chromatin Mobility and Organization Changes During Differentiation

open access: yesAdvanced Science, EarlyView.
A novel chromatin‐labeling probe is developed to investigate chromatin mobility during differentiation. The silicon rhodamine–conjugated dCTP is efficiently delivered into iPSCs and NSCs using a synthetic transporter. Super‐resolution microscopy and single‐particle tracking show decreased chromatin mobility during differentiation.
Maruthi K. Pabba   +11 more
wiley   +1 more source

A Natural Major Module Confers the Trade‐Off between Phenotypic Mean and Plasticity of Grain Chalkiness in Rice

open access: yesAdvanced Science, EarlyView.
This study reveals the genetic and molecular mechanisms controlling the general trade‐off between phenotypic mean and plasticity of grain chalkiness in rice and identifies two major external drivers (high temperature and wide grain) and a natural major module (GCP6‐MPC5) that control this trade‐off.
Juncheng Zhang   +10 more
wiley   +1 more source

Analysis of the Fault Attack ECDLP over Prime Field

open access: yesJournal of Applied Mathematics, 2011
In 2000, Biehl et al. proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. An elliptic curve E is defined over prime field 𝔽p with base point P∈E(𝔽p).
Mingqiang Wang, Tao Zhan
doaj   +1 more source

Cerebral Organoids with Integrated Endothelial Networks Emulate the Neurovascular Unit and Mitigate Core Necrosis

open access: yesAdvanced Science, EarlyView.
Fumadó Navarro et al. present an optimized strategy to generate vascular‐like networks that infiltrate within cerebral organoids with promising signs of blood‐brain barrier characteristics, preserved stiffness, uniform morphology, enhanced media diffusion, and reduced necrotic core.
Josep Fumadó Navarro   +7 more
wiley   +1 more source

An Automated Lab‐On‐A‐Chip Approach for Pollen Tube Growth Manipulation in a Controlled Chemical Environment

open access: yesAdvanced Science, EarlyView.
Here, a microfluidic‐based robotic lab‐on‐a‐chip (LoC) device is presented for automated, continuous‐flow investigation and manipulation of single pollen tube growth under precisely controlled chemical gradients. This closed‐loop system streamlines data collection and analysis while enhancing experimental precision compared to manual methods ...
Jiawei Zhu   +10 more
wiley   +1 more source

High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves (Extended Thesis Summary)

open access: yesCLEI Electronic Journal
Cryptography based on elliptic curves is endowed with efficient methods for public-key cryptography. Recent research has shown the superiority of the Montgomery and Edwards curves over the Weierstrass curves as they require fewer arithmetic operations ...
Armando Faz Hernandez, Julio López
doaj   +1 more source

Dual-field modular multiplier using Kogge-Stone adder

open access: yesDianzi Jishu Yingyong, 2019
As the key operation, modular multiplication is the highest frequency of use in elliptic curve cryptography algorithm. Improving its operation speed is great significant to improve the performance of elliptic curve cryptography processor.
Yang Danyang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy