Results 81 to 90 of about 177,129 (337)

A certificateless Multi-receiver Encryption scheme based on SM2 signature algorithm

open access: yesHigh-Confidence Computing, 2023
The Multi-receiver Encryption (MRE) scheme can meet the secure data transmission requirements in multicast and broadcast scenarios. To meet compliance, critical information infrastructure in China should be protected with Chinese national commercial ...
Jinglin Zou   +5 more
doaj  

Tuning the Morphological Properties of Granular Hydrogels to Control Lymphatic Capillary Formation

open access: yesAdvanced Materials Interfaces, EarlyView.
Tuning the morphological properties of granular hydrogels is essential to generate robust lymphatic capillary networks that express key lymphatic gene and protein markers. The study demonstrates that 3D in vitro lymphatic tube formation is controlled not by the mechanical properties of the gel, but by the pore size and topology (periodicity) of the gel
Daniel Montes   +7 more
wiley   +1 more source

SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography

open access: yesIEEE Access, 2019
Many applications use asymmetric cryptography to secure communications between two parties. One of the main issues with asymmetric cryptography is the need for vast amounts of computation and storage.
Hisham N. Almajed, Ahmad S. Almogren
doaj   +1 more source

Secure Image Transmission Using Chaotic-Enhanced Elliptic Curve Cryptography

open access: yesIEEE Access, 2020
In this paper, a novel scheme for secure and real time image transmission is introduced. The scheme uses a block-based elliptic curve (BBEC) public key encryption as a first stage of encryption so it solves the key distribution and management problem of ...
Roayat Ismail Abdelfatah
doaj   +1 more source

Combined small subgroups and side-channel attack on elliptic curves with cofactor divisible by 2m [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2019
Nowadays, alternative models of elliptic curves like Montgomery, Edwards, twisted Edwards, Hessian, twisted Hessian, Huff’s curves and many others are very popular and many people use them in cryptosystems which are based on elliptic curve cryptography ...
Michał Wrońska
doaj   +1 more source

Encryption, Elliptic Curves, and the Symmetries of Differential Equations [PDF]

open access: yes, 2017
In cryptography, encryption is the process of encoding messages in such a way that only authorized parties can access them. The intended information, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can ...
Spatig, Shantel
core   +1 more source

On the Classification of Weierstrass Elliptic Curves over $\mathbb{Z}_n$ [PDF]

open access: yesarXiv, 2023
The development of secure cryptographic protocols and the subsequent attack mechanisms have been placed in the literature with the utmost curiosity. While sophisticated quantum attacks bring a concern to the classical cryptographic protocols present in the applications used in everyday life, the necessity of developing post-quantum protocols is felt ...
arxiv  

Beyond 3D: Smart Material Systems for Microscale 4D Printing

open access: yesAdvanced Materials Technologies, EarlyView.
Smart materials exhibit shape changes in response to their environment, enabling scientists to go beyond 3D in the rapidly growing field of 4D printing. This review covers recent advances, current challenges, and emerging trends in 4D printing on the microscale.
Daniel Maher   +3 more
wiley   +1 more source

Enantio‐ and Diastereoselective Synthesis and Spiral‐Stair‐Like Single Helix Assembly of Figure‐Eight Cyclophenylenes

open access: yesAngewandte Chemie, EarlyView.
We present here the enantio‐ and diastereoselective synthesis of chiral figure‐eight [10]cyclophenylenes via the rhodium‐catalyzed four consecutive intramolecular [2 + 2 + 2] cycloadditions of dodecaynes with two flexible biphenyl units, resulting in increased rotational freedom of the reaction intermediates.
Kohei Adachi   +5 more
wiley   +2 more sources

Phase-Image-Encryption-Based Elliptic Curve and Double-Random-Phase Encoding

open access: yesEngineering Proceedings
In this paper, we proposed an enhanced asymmetric cryptosystem scheme for image encryption using a combination of Elliptic Curve and Fourier transformations. Our proposed encryption and decryption process is highly secure with a smaller key size compared
Arabind Kumar, Sanjay Yadav, Tarul Garg
doaj   +1 more source

Home - About - Disclaimer - Privacy