Results 51 to 60 of about 12,362 (163)

A Provably-Secure Outsourced Revocable Certificateless Signature Scheme Without Bilinear Pairings

open access: yesIEEE Access, 2018
Certificateless public key cryptosystem (CLPKC) is a desirable cryptographic system because it refrains from both certificate management and key escrow. In CLPKC, how to revoke a misbehaving or compromised user is an important issue.
Hongzhen Du, QiaoYan Wen, Shanshan Zhang
doaj   +1 more source

Spaceborne and spaceborn: Physiological aspects of pregnancy and birth during interplanetary flight

open access: yesExperimental Physiology, EarlyView.
Abstract Crewed interplanetary return missions that are on the planning horizon will take years, more than enough time for initiation and completion of a pregnancy. Pregnancy is viewed as a sequence of processes – fertilization, blastocyst formation, implantation, gastrulation, placentation, organogenesis, gross morphogenesis, birth and neonatal ...
Arun V. Holden
wiley   +1 more source

Implementasi Algoritma ECDSA untuk Pengamanan E-Mail (Verifikasi Keaslian Pesan) [PDF]

open access: yes, 2010
This final project is discussed about implementation of digital signature on email delivery with java programming language. Digital signature is one of the cryptographic security services that provide assurance to the recipient of the message (receiver).
Prabowo, Pualam Sendi Agung   +2 more
core  

Secure communication mechanism for VSN based on certificateless signcryption

open access: yesTongxin xuebao, 2021
To solve the communication security problems of vehicular social network (VSN), an efficient certificateless signcryption scheme was proposed.The proposed scheme was proven secure in the random oracle model based on the computational Diffie-Hellman ...
Wenbo ZHANG, Wenhua HUANG, Jingyu FENG
doaj   +2 more sources

Topological analysis of number theory and its applications in quantum cryptography [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة
This study investigates the application of algebraic topology, in particular homology theory and persistent homology. It includes the analysis of elliptic curves and their use in cryptographic systems and cybersecurity.
Noor Kadhim, Ruaa Abd, Saja AL-Khafaji
doaj   +1 more source

Can we Beat the Square Root Bound for ECDLP over 𝔽p2 via Representation?

open access: yesJournal of Mathematical Cryptology, 2020
We give a 4-list algorithm for solving the Elliptic Curve Discrete Logarithm (ECDLP) over some quadratic field 𝔽p2. Using the representation technique, we reduce ECDLP to a multivariate polynomial zero testing problem.
Delaplace Claire, May Alexander
doaj   +1 more source

Uncertainty quantification via polynomial chaos expansion of myocardial fibre orientation and cardiac activation patterns

open access: yesThe Journal of Physiology, EarlyView.
Abstract figure legend Graphical representation of methods. We implemented three biventricular geometric models (Zenger et al., 2020) with rule‐based myocardial fibre orientations (Bayer et al., 2018). We evaluated variability in the fibre orientation via four sets of parameter distributions to determine the role of the primary and imbrication angles ...
Lindsay C. R. Tanner   +8 more
wiley   +1 more source

Public Key Cryptography based on Semigroup Actions [PDF]

open access: yes, 2007
A generalization of the original Diffie-Hellman key exchange in $(\Z/p\Z)^*$ found a new depth when Miller and Koblitz suggested that such a protocol could be used with the group over an elliptic curve.
Maze, G., Monico, C., Rosenthal, J.
core   +1 more source

Degree theory for 4‐dimensional asymptotically conical gradient expanding solitons

open access: yesCommunications on Pure and Applied Mathematics, Volume 79, Issue 5, Page 1151-1298, May 2026.
Abstract We develop a new degree theory for 4‐dimensional, asymptotically conical gradient expanding solitons. Our theory implies the existence of gradient expanding solitons that are asymptotic to any given cone over S3$S^3$ with non‐negative scalar curvature. We also obtain a similar existence result for cones whose link is diffeomorphic to S3/Γ$S^3/\
Richard H. Bamler, Eric Chen
wiley   +1 more source

An Improved GN-AK Protocol Using Double-Base Scalar Multiplication and Point Halving over Elliptic Curves

open access: yesApplied Sciences
Starting from the basic form of GN-authenticated key agreement (GN-AK), the current research proposes an improved protocol by integrating a new scalar multiplication technique based on a dual-base chain representation with bases 1/2 and 3.
Nicolae Constantinescu   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy