Results 81 to 90 of about 177,129 (337)
A certificateless Multi-receiver Encryption scheme based on SM2 signature algorithm
The Multi-receiver Encryption (MRE) scheme can meet the secure data transmission requirements in multicast and broadcast scenarios. To meet compliance, critical information infrastructure in China should be protected with Chinese national commercial ...
Jinglin Zou+5 more
doaj
Tuning the Morphological Properties of Granular Hydrogels to Control Lymphatic Capillary Formation
Tuning the morphological properties of granular hydrogels is essential to generate robust lymphatic capillary networks that express key lymphatic gene and protein markers. The study demonstrates that 3D in vitro lymphatic tube formation is controlled not by the mechanical properties of the gel, but by the pore size and topology (periodicity) of the gel
Daniel Montes+7 more
wiley +1 more source
SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography
Many applications use asymmetric cryptography to secure communications between two parties. One of the main issues with asymmetric cryptography is the need for vast amounts of computation and storage.
Hisham N. Almajed, Ahmad S. Almogren
doaj +1 more source
Secure Image Transmission Using Chaotic-Enhanced Elliptic Curve Cryptography
In this paper, a novel scheme for secure and real time image transmission is introduced. The scheme uses a block-based elliptic curve (BBEC) public key encryption as a first stage of encryption so it solves the key distribution and management problem of ...
Roayat Ismail Abdelfatah
doaj +1 more source
Combined small subgroups and side-channel attack on elliptic curves with cofactor divisible by 2m [PDF]
Nowadays, alternative models of elliptic curves like Montgomery, Edwards, twisted Edwards, Hessian, twisted Hessian, Huff’s curves and many others are very popular and many people use them in cryptosystems which are based on elliptic curve cryptography ...
Michał Wrońska
doaj +1 more source
Encryption, Elliptic Curves, and the Symmetries of Differential Equations [PDF]
In cryptography, encryption is the process of encoding messages in such a way that only authorized parties can access them. The intended information, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can ...
Spatig, Shantel
core +1 more source
On the Classification of Weierstrass Elliptic Curves over $\mathbb{Z}_n$ [PDF]
The development of secure cryptographic protocols and the subsequent attack mechanisms have been placed in the literature with the utmost curiosity. While sophisticated quantum attacks bring a concern to the classical cryptographic protocols present in the applications used in everyday life, the necessity of developing post-quantum protocols is felt ...
arxiv
Beyond 3D: Smart Material Systems for Microscale 4D Printing
Smart materials exhibit shape changes in response to their environment, enabling scientists to go beyond 3D in the rapidly growing field of 4D printing. This review covers recent advances, current challenges, and emerging trends in 4D printing on the microscale.
Daniel Maher+3 more
wiley +1 more source
We present here the enantio‐ and diastereoselective synthesis of chiral figure‐eight [10]cyclophenylenes via the rhodium‐catalyzed four consecutive intramolecular [2 + 2 + 2] cycloadditions of dodecaynes with two flexible biphenyl units, resulting in increased rotational freedom of the reaction intermediates.
Kohei Adachi+5 more
wiley +2 more sources
Phase-Image-Encryption-Based Elliptic Curve and Double-Random-Phase Encoding
In this paper, we proposed an enhanced asymmetric cryptosystem scheme for image encryption using a combination of Elliptic Curve and Fourier transformations. Our proposed encryption and decryption process is highly secure with a smaller key size compared
Arabind Kumar, Sanjay Yadav, Tarul Garg
doaj +1 more source