Results 81 to 90 of about 24,382 (331)
Elliptic Curves and Cryptography
Durch die zunehmende Digitalisierung, und insbesondere dem sogenannten "Internet of Things", ist der Bedarf an zuverlässigen kryptografischen Verfahren nicht nur für Behörden, sondern auch für Privatpersonen wichtig geworden. In den letzten Jahrzehnten wurde eine Vielzahl an unterschiedlichsten Lösungen präsentiert.
openaire
Biogenic Next‐Gen CPL Emitters: Strategies with Proteins, Polysaccharides, and Nucleotides
Biogenic molecules such as proteins, peptides, saccharides, and DNA can act as natural scaffolds for generating circularly polarized luminescence (CPL). This review highlights recent strategies exploiting these inherently chiral frameworks to achieve light emission with controllable handedness under unpolarized excitation, bridging biological ...
Ricardo Chavez‐Jimenez +4 more
wiley +1 more source
Multiple point compression on curves [PDF]
Multiple point compression is an important feature to improve the implementation of elliptic curve cryptography. This can be extended to other curves, in particular hyperelliptic curves, with divisors represented in Mumford ...
Fan, X. +3 more
core +1 more source
This study develops a superconvergent meshless method to analyze and control vibrations in twisted, bidirectional functionally graded Terfenol‐D beams. By optimizing magnetostrictive patch placement, it demonstrates effective vibration suppression under dynamic loads, highlighting the design potential of strategically graded materials in complex ...
Mukund A. Patil +2 more
wiley +1 more source
Duffing Oscillator and Elliptic Curve Cryptography [PDF]
7 pages, LaTeX with AMS ...
openaire +3 more sources
In this study maize chloroplastic malate dehydrogenase7 (ZmMDH7), is identified as a Rhizoctonia solani resistance gene in maize. ZmMDH7 is regulated by transcription factor ZmWRKY44 via pathogens challenge to elevate mitochondrial ROS and SA signaling pathway.
Luyang Wei +9 more
wiley +1 more source
In order to prevent personal data from being lacked and improve the existing mobile network roaming anonymous authentication scheme,anonymous security authentication scheme using elliptic curve cryptography and hash functions in mobile network was ...
Yuehui CHEN, Miao HUANG
doaj +2 more sources
A Robust Synthesis of Fluorosurfactants with Tunable Functionalities via a Two‐Step Reaction
The fluorosurfactants are synthesized through a two‐step reaction, and demonstrated excellent performance in droplet microfluidics. In addition, they exhibited tunable functionalities at the droplet interface via hydrogen bonding and coordination interactions.
Jiyuan Yao +10 more
wiley +1 more source
Discrete logarithms in curves over finite fields [PDF]
A survey on algorithms for computing discrete logarithms in Jacobians of curves over finite ...
Andreas Enge +4 more
core +5 more sources
Structure‐Based Development of Ultra‐Broad‐Spectrum 3C‐Like Protease Inhibitors
This study provides an in‐depth analysis of the substrate binding pocket of 3CLpros across all coronavirus species using bioinformatics and structural insights, revealing the critical impact of S2/S4 subsite diversity on the broad‐spectrum activity of approved therapeutics.
Haixia Su +15 more
wiley +1 more source

