Results 71 to 80 of about 7,729 (216)
A certificateless Multi-receiver Encryption scheme based on SM2 signature algorithm
The Multi-receiver Encryption (MRE) scheme can meet the secure data transmission requirements in multicast and broadcast scenarios. To meet compliance, critical information infrastructure in China should be protected with Chinese national commercial ...
Jinglin Zou+5 more
doaj
iTrust—A Trustworthy and Efficient Mapping Scheme in Elliptic Curve Cryptography
Recently, many platforms have outsourced tasks to numerous smartphone devices known as Mobile Crowd-sourcing System (MCS). The data is collected and transferred to the platform for further analysis and processing.
Hisham Almajed+2 more
doaj +1 more source
Cryptanalysis and Improved Image Encryption Scheme Using Elliptic Curve and Affine Hill Cipher
In the present era of digital communication, secure data transfer is a challenging task in the case of open networks. Low-key-strength encryption techniques incur enormous security threats.
Parveiz Nazir Lone+5 more
doaj +1 more source
The Printess is a low‐cost, open‐source, multimaterial 3D printer for direct ink writing. Built for under $250, it is highly customizable and supports various advanced direct ink writing modalities, including multimaterial mixing, multimaterial multinozzle, and embedded 3D printing.
Jonathan D. Weiss+14 more
wiley +1 more source
Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm
Elliptic-curve cryptography (ECC) has become a robust cryptographic technique that ensures secure data transmission with comparatively small key sizes.
Sanjay Kumar, Deepmala Sharma
doaj +1 more source
Analysis of Parallel Montgomery Multiplication in CUDA [PDF]
For a given level of security, elliptic curve cryptography (ECC) offers improved efficiency over classic public key implementations. Point multiplication is the most common operation in ECC and, consequently, any significant improvement in perfor- mance ...
Liu, Yuheng
core +1 more source
Securing the Data in Clouds with Hyperelliptic Curve Cryptography
In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility,
Agrawal, Tanmay+3 more
core +1 more source
A novel simple power analysis (SPA) attack against elliptic curve cryptography (ECC) [PDF]
Tianhong Xu
openalex +1 more source
Mem‐Transistor‐Based Gaussian Error–Generating Hardware for Post‐Quantum Cryptography Applications
The demonstration of a Gaussian error sampler system that leverages the intrinsic stochastic characteristics of mem‐transistor semiconductor devices. The demonstrated Gaussian error sampler significantly reduces computational and memory overhead compared to existing techniques.
Moon‐Seok Kim+3 more
wiley +1 more source
Directional Swimming of B. Subtilis Bacteria Near a Switchable Polar Surface
B. Subtilis bacteria swimming in a water dispersion (terrific broth) adjacent to a glassy ferroelectric nematic liquid crystal INF) film tend to move in the direction antiparallel to the spontaneous electric polarization at the NF surface. Their speed is found to be the same with or without a polar NF layer.
Mahesha Kodithuwakku Arachchige+5 more
wiley +1 more source