Results 61 to 70 of about 17,749 (300)

Endomorphisms on elliptic curves for optimal subspaces and applications to differential equations and nonlinear cryptography

open access: yesElectronic Journal of Differential Equations, 2015
Finite spaces are used on elliptic curves cryptography (ECC) to define the necessary parameters for nonlinear asymmetric cryptography, and to optimize certain solutions of differential equations.
Oana Adriana Ticleanu
doaj  

From Mechanics to Electronics: Influence of ALD Interlayers on the Multiaxial Electro‐Mechanical Behavior of Metal–Oxide Bilayers

open access: yesAdvanced Functional Materials, EarlyView.
Ultrathin AlOxHy interlayers between aluminum films and polymer substrates significantly improve electro‐mechanical properties of flexible thin film systems. By precisely controlling interlayer thickness using atomic layer deposition, this study identifies an optimal interlayer thickness of 5–10 nm that enhances ductility and delays cracking.
Johanna Byloff   +9 more
wiley   +1 more source

Isolated elliptic curves and the MOV attack

open access: yesJournal of Mathematical Cryptology, 2017
We present a variation on the CM method that produces elliptic curves over prime fields with nearly prime order that do not admit many efficiently computable isogenies. Assuming the Bateman–Horn conjecture, we prove that elliptic curves produced this way
Scholl Travis
doaj   +1 more source

MAGTWIST: A Magnetically‐Driven Rotary Actuator Using a Traveling‐Wave With Integrated Stiffness Tunability

open access: yesAdvanced Functional Materials, EarlyView.
MAGTWIST: A compact magnetic rotary actuator, enabling smooth, stepless rotation, and on‐demand locking. Inspired by peristalsis, a soft polymer belt generates a traveling‐wave, enabling 270° rotation when heated. Cooling stiffens the belt, locking it in position and enabling it to withstand high loads.
Simon Frieler   +3 more
wiley   +1 more source

An attack on disguised elliptic curves

open access: yesJournal of Mathematical Cryptology, 2008
We present an attack on one of the Hidden Pairing schemes proposed by Dent and Galbraith. We drastically reduce the number of variables necessary to perform a multivariate attack and in some cases we can completely recover the private key.
Morales David J. Mireles
doaj   +1 more source

Biomaterials‐Based Hydrogel with Superior Bio‐Mimetic Ionic Conductivity and Tissue‐Matching Softness for Bioelectronics

open access: yesAdvanced Functional Materials, EarlyView.
By mimicking the ion‐accelerating effect of ion channel receptors in neuron membranes, a biomaterials‐based ionic hydrogel (BIH) is developed, which offers a high ionic conductivity of 7.04 S m−1, outperforming conventional chitosan, cellulose, agarose, starch, and gelatin based ionic hydrogels.
Baojin Chen   +7 more
wiley   +1 more source

A Weighted Universality Theorem for L-Functions of Elliptic Curves

open access: yesJaunųjų Mokslininkų Darbai, 2018
In the paper, a short survey on universality results for L-functions of elliptic curves over the field of rational numbers is given and weighted universality theorem is proven. All stated universality theorems are of continuous type.
Antanas Garbaliauskas   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy