Results 71 to 80 of about 129,653 (280)

LEA: Link Encryption Algorithm Proposed Stream Cipher Algorithm

open access: yesAin Shams Engineering Journal, 2015
Cryptographic algorithms for confidentiality and authentication play a major important role in nowadays information security Sen (2012) [1]. Encryption algorithms are becoming more necessary to ensure the securely transmitted data over insecure ...
Hadia M.S. El Hennawy   +2 more
doaj   +1 more source

Smart Catheters for Diagnosis, Monitoring, and Therapy

open access: yesAdvanced Healthcare Materials, EarlyView.
This study presents a comprehensive review of smart catheters, an emerging class of medical devices that integrate embedded sensors, robotics, and communication systems, offering increased functionality and complexity to enable real‐time health monitoring, diagnostics, and treatment. Abstract This review explores smart catheters as an emerging class of
Azra Yaprak Tarman   +12 more
wiley   +1 more source

Improving Error Correction Stage and Expanding the Final Key using Dynamic Linear-feedback Shift Register in Sarg04 Protocol

open access: yesPolytechnic Journal, 2019
The mechanism of quantum mechanics is considered as the principal method of quantum key distribution for transmitting a cryptographic key between users in unconditionally secure communication.
Omar Sh. Mustafa   +2 more
doaj   +1 more source

Minimal hardware, binary sequence pseudonoise generator and detector [PDF]

open access: yes, 1973
General purpose sequence generator which includes 35-stage field shift register determines mathematical properties of polynomials such as divisibility, period, order of roots, and other parameters that effect desirability of various sequences for ...
Perlman, M.
core   +1 more source

Microneedle Technology in Psoriasis Management: Mechanistic Insights, Technological Innovation, Clinical Progress, and Challenges

open access: yesAdvanced Healthcare Materials, EarlyView.
This review explores the evolving role of microneedle systems in psoriasis management, highlighting their potential for enhanced drug delivery, diagnosis, and disease monitoring. It also discusses unmet clinical needs for psoriasis management and technical challenges, while outlining strategic directions to advance microneedle integration into routine ...
Fatma Moawad   +3 more
wiley   +1 more source

SYNTHESIS OF PRIMITIVE MATRICES OVER A FINITE GALOIS FIELDS AND THEIR APPLICATIONS

open access: yesÌнформаційні технології в освіті, 2012
The algorithms for constructing generalized primitive matrices Galois and Fibonacci arbitrary order , the items belong to the prime field , . The examples of application of these matrices in the problems of the synthesis of generalized linear shift ...
A.J. Beletsky, А.А. Beletsky
doaj  

Linkable Ring Signatures from Linear Feedback Shift Register [PDF]

open access: yes, 2007
Linkable ring signatures can simultaneously provide the properties of anonymity, spontaneity as well as linkability. Linear feedback shift register (LFSR) sequence can be used to shorten the representation of elements in a field. This paper proposes an LFSR-based linkable ring signature scheme, whose main computation operations are performed in base ...
Dong Zheng   +3 more
openaire   +1 more source

Kidney Organoids in Drug Development: Integrating Technological Advances and Standardization for Effective Implementation

open access: yesAdvanced Healthcare Materials, EarlyView.
This review examines how emerging enabling technologies enhance the physiological relevance, scalability, and reproducibility of kidney organoids, while advanced analytical approaches support model validation and deepen mechanistic insight into nephrotoxicity.
Helen Kearney   +3 more
wiley   +1 more source

Non-linear M -sequences Generation Method

open access: yesБезопасность информационных технологий, 2011
The article deals with a new method for modeling a pseudorandom number generator based on R-blocks. The gist of the method is the replacement of a multi digit XOR element by a stochastic adder in a parallel binary linear feedback shift register scheme.
Z. R. Garifullina   +3 more
doaj  

Observations on TETRA Encryption Algorithm TEA-3

open access: yesIACR Transactions on Symmetric Cryptology
We present a number of observations on TEA-3, a stream cipher used in TETRA radio networks that was kept secret until recently. While the same also holds for the six other TETRA encryption algorithms, we pick TEA-3 to start with, as (i) it is not ...
Jens Alich   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy