Results 61 to 70 of about 391,497 (318)

Irreducible polynomials in Int(ℤ)

open access: yesITM Web of Conferences, 2018
In order to fully understand the factorization behavior of the ring Int(ℤ) = {f ∈ ℚ[x] | f (ℤ) ⊆ ℤ} of integer-valued polynomials on ℤ, it is crucial to identify the irreducible elements.
Antoniou Austin   +2 more
doaj   +1 more source

New Semi-Prime Factorization and Application in Large RSA Key Attacks

open access: yesJournal of Cybersecurity and Privacy, 2021
Semi-prime factorization is an increasingly important number theoretic problem, since it is computationally intractable. Further, this property has been applied in public-key cryptography, such as the Rivest–Shamir–Adleman (RSA) encryption systems for ...
Anthony Overmars   +1 more
doaj   +1 more source

Carbon Nanotube 3D Integrated Circuits: From Design to Applications

open access: yesAdvanced Functional Materials, EarlyView.
As Moore's law approaches its physical limits, carbon nanotube (CNT) 3D integrated circuits (ICs) emerge as a promising alternative due to the miniaturization, high mobility, and low power consumption. CNT 3D ICs in optoelectronics, memory, and monolithic ICs are reviewed while addressing challenges in fabrication, design, and integration.
Han‐Yang Liu   +3 more
wiley   +1 more source

Fractional Skyrmion Tubes in Chiral‐Interfaced 3D Magnetic Nanowires

open access: yesAdvanced Functional Materials, EarlyView.
In chiral 3D helical magnetic nanowires, the coupling between the geometric and magnetic chirality provides a way to create topological spin states like vortex tubes. Here, it is demonstrated how the breaking of this coupling in interfaced 3D nanowires of opposite chirality leads to even more complex topological spin states, such as fractional ...
John Fullerton   +11 more
wiley   +1 more source

Factoring Integers with Elliptic Curves

open access: yesThe Annals of Mathematics, 1987
Summary: This paper is devoted to the description and analysis of a new algorithm to factor positive integers. It depends on the use of elliptic curves. The new method is obtained from \textit{J. M. Pollard}'s \(p-1\)-method [Proc. Camb. Philos. Soc. 76, 521--528 (1974; Zbl 0294.10005)] by replacing the multiplicative group by the group of points on a ...
openaire   +6 more sources

Ultrafast Energy Transfer Induced Lasing From a Coplanar Donor‐Acceptor‐Donor Molecule in a Microspherical Cavity

open access: yesAdvanced Functional Materials, EarlyView.
This study presents a novel donor‐bridge‐acceptor‐bridge‐donor (D‐B‐A‐B‐D) molecular system, which shows near‐unity intramolecular excitation energy transfer (IET) from two identical energy donors to a coplanar acceptor. It enables a four‐level energy system for efficient lasing at the acceptor emission band in a microspherical cavity with a low lasing
Vishal Kumar   +6 more
wiley   +1 more source

Comparative analysis of integer factorization algorithms

open access: yesMANAS: Journal of Engineering, 2015
Integer factorization problem, which is used as the basis in many public key cryptosystem, is generally thought to be hard problem even on a modern computers.
G. Kimsanova, R. Ismailova, R. Sultanov
doaj  

Probabilistic computing with percolating nanoparticle networks using experimental data with signatures of criticality

open access: yesNeuromorphic Computing and Engineering
Percolating networks of nanoparticles (PNNs) are promising systems for neuromorphic computing due to their brain-like network structure and dynamics. In particular, electrical spiking in PNNs meets criteria for criticality, which is thought to be the ...
Sofie J Studholme   +3 more
doaj   +1 more source

Factorization of cubic vertices involving three different higher spin fields

open access: yesNuclear Physics B, 2014
We derive a class of cubic interaction vertices for three higher spin fields, with integer spins λ1, λ2, λ3, by closing commutators of the Poincaré algebra in four-dimensional flat spacetime.
Y.S. Akshay, Sudarshan Ananth
doaj   +1 more source

A Robust and Hybrid Cryptosystem for Identity Authentication

open access: yesInformation, 2021
With the progressive development of a wide range of applications, interconnect things and internet of things (IoT) became an imperative required trend by industries and academicians. IoT became a base infrastructure for remote access or control depending
Ali Takieldeen   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy