Results 61 to 70 of about 12,362 (163)

Isoperimetric inequalities on slabs with applications to cubes and Gaussian slabs

open access: yesCommunications on Pure and Applied Mathematics, Volume 79, Issue 4, Page 1012-1072, April 2026.
Abstract We study isoperimetric inequalities on “slabs”, namely weighted Riemannian manifolds obtained as the product of the uniform measure on a finite length interval with a codimension‐one base. As our two main applications, we consider the case when the base is the flat torus R2/2Z2$\mathbb {R}^2 / 2 \mathbb {Z}^2$ and the standard Gaussian measure
Emanuel Milman
wiley   +1 more source

Algorithm based on Booth's Encoding Pattern for Fast Scalar Point Multiplication for ECC in Wireless Sensor Networks [PDF]

open access: yes, 2011
With the rapid increase of small devices and its usage, a better suitable security providing mechanism must be incorported keeping the resource constraints of the devices in mind. Elliptic Curve Cryptography (ECC) serves the best and highly suitable for
Levaka, Ravi Teja Reddy
core  

Minors solve the elliptic curve discrete logarithm problem

open access: yes, 2023
The elliptic curve discrete logarithm problem is of fundamental importance in public-key cryptography. It is in use for a long time. Moreover, it is an interesting challenge in computational mathematics.
Abdullah, Ansari, Mahalanobis, Ayan
core  

Storage and Communication Security in Cloud Computing Using a Homomorphic Encryption Scheme Based Weil Pairing

open access: yesElektronika ir Elektrotechnika, 2020
With introduction of smart things into our lives, cloud computing is used in many different areas and changes the communication method. However, cloud computing should guarantee the complete security assurance in terms of privacy protection ...
Demet Cidem Dogan, Huseyin Altindis
doaj   +1 more source

Agents' Behavior and Interest Rate Model Optimization in DeFi Lending

open access: yesMathematical Finance, Volume 36, Issue 2, Page 374-396, April 2026.
ABSTRACT Contrasting sharply with traditional money, bond, and bond futures markets, where interest rates emerge organically from participant interactions, DeFi lending platforms employ rule‐based interest rates that are algorithmically set. Thus, the selection of an effective interest rate model (IRM) is paramount for the success of a lending protocol.
Charles Bertucci   +4 more
wiley   +1 more source

Elliptic Curve Cryptosystem on the Base of Discrete Logarithm Generator [PDF]

open access: yes, 1998
In this paper, we showed the theory of elliptic curve, discrete logarithm problem (DLD), elliptic curve discrete logarithm problem (EDLP), discrete logarithm generator and EIGamal cryptosystem and elliptic cryptosystem.
72451   +15 more
core  

Quantum algorithms for problems in number theory, algebraic geometry, and group theory

open access: yes, 2012
Quantum computers can execute algorithms that sometimes dramatically outperform classical computation. Undoubtedly the best-known example of this is Shor's discovery of an efficient quantum algorithm for factoring integers, whereas the same problem ...
Sasaki, Yoshitaka, van Dam, Wim
core   +1 more source

Stable Model Reduction for Time‐Domain Room Acoustics: A Structure‐Preserving Formulation for Complex Boundaries

open access: yesInternational Journal for Numerical Methods in Engineering, Volume 127, Issue 5, 15 March 2026.
ABSTRACT This work presents novel structure‐preserving formulations for stable model order reduction in the context of time‐domain room acoustics simulations. A solution to address the instability in conventional model order reduction formulations based on the Linearized Euler Equations is derived and validated through numerical experiments.
Satish Bonthu   +4 more
wiley   +1 more source

A Novel Blind Signature Based Upon ECDLP [PDF]

open access: yes, 2011
Encryption and decryption techniques protect the condentiality of information exchanged in a network whereas digital signature is electronic signing of data that provide senders authentication using its secret key and verication using its public key and
Chhotaray, Animesh Chhotaray   +1 more
core  

Elliptic-Möbius S-boxes: A hybrid algebraic construction for cryptographic applications

open access: yesAlexandria Engineering Journal
Substitution boxes (S-boxes) are the nonlinear core of block ciphers, and their design critically impacts resistance against cryptanalytic attacks. Existing approaches either use chaotic maps, which often exhibit structural weaknesses, or elliptic curve (
M. Awais Ehsan   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy