Results 71 to 80 of about 24,925 (334)
Terahertz Volume Plasmon‐Polariton Modulation in All‐Dielectric Hyperbolic Metamaterials
THz volume plasmon‐polariton (VPP) propagation through plasmon‐based hyperbolic metamaterials, made of alternating layers of doped and undoped III‐V semiconductors. Abstract The development of plasmonics and related applications in the terahertz range faces limitations due to the intrinsic high electron density of the standard metals.
Stefano Campanaro +3 more
wiley +1 more source
Enhanced Elliptic Curve Cryptography
Background/Objectives: Today’s Technological world Information Security is an essential for commercial and legal trading, secrecy, truthfulness and non-reputability. The Elliptic Curve Cryptography (ECC) has become one of the latest trends in the field of Public-Key Cryptography (PKC). ECC promises a faster, efficient and more secured.
S. Thiraviya Regina Rajam +1 more
openaire +1 more source
Phase-Image-Encryption-Based Elliptic Curve and Double-Random-Phase Encoding
In this paper, we proposed an enhanced asymmetric cryptosystem scheme for image encryption using a combination of Elliptic Curve and Fourier transformations. Our proposed encryption and decryption process is highly secure with a smaller key size compared
Arabind Kumar, Sanjay Yadav, Tarul Garg
doaj +1 more source
Combined small subgroups and side-channel attack on elliptic curves with cofactor divisible by 2m [PDF]
Nowadays, alternative models of elliptic curves like Montgomery, Edwards, twisted Edwards, Hessian, twisted Hessian, Huff’s curves and many others are very popular and many people use them in cryptosystems which are based on elliptic curve cryptography ...
Michał Wrońska
doaj +1 more source
EGF‐induced de novo transcription of connexins Cx26 and Cx31 promotes flocking behavior that fluidizes epithelia and enables coordinated collective migration. Connexin‐driven cytoplasmic exchange mechanistically links growth‐factor signaling to invasive dynamics.
Hind Abdo +18 more
wiley +1 more source
Algorithm based on Booth's Encoding Pattern for Fast Scalar Point Multiplication for ECC in Wireless Sensor Networks [PDF]
With the rapid increase of small devices and its usage, a better suitable security providing mechanism must be incorported keeping the resource constraints of the devices in mind. Elliptic Curve Cryptography (ECC) serves the best and highly suitable for
Levaka, Ravi Teja Reddy
core
In this study maize chloroplastic malate dehydrogenase7 (ZmMDH7), is identified as a Rhizoctonia solani resistance gene in maize. ZmMDH7 is regulated by transcription factor ZmWRKY44 via pathogens challenge to elevate mitochondrial ROS and SA signaling pathway.
Luyang Wei +9 more
wiley +1 more source
Secure Image Transmission Using Chaotic-Enhanced Elliptic Curve Cryptography
In this paper, a novel scheme for secure and real time image transmission is introduced. The scheme uses a block-based elliptic curve (BBEC) public key encryption as a first stage of encryption so it solves the key distribution and management problem of ...
Roayat Ismail Abdelfatah
doaj +1 more source
Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors [PDF]
Resource constraints in smart devices demand an efficient cryptosystem that allows for low power and memory consumption. This has led to popularity of comparatively efficient Elliptic curve cryptog-raphy (ECC).
Malik, Yasir
core +1 more source
Refinements of Miller's Algorithm over Weierstrass Curves Revisited
In 1986 Victor Miller described an algorithm for computing the Weil pairing in his unpublished manuscript. This algorithm has then become the core of all pairing-based cryptosystems. Many improvements of the algorithm have been presented.
Le, Duc-Phong, Liu, Chao-Liang
core +1 more source

