Results 71 to 80 of about 129,653 (280)
LEA: Link Encryption Algorithm Proposed Stream Cipher Algorithm
Cryptographic algorithms for confidentiality and authentication play a major important role in nowadays information security Sen (2012) [1]. Encryption algorithms are becoming more necessary to ensure the securely transmitted data over insecure ...
Hadia M.S. El Hennawy +2 more
doaj +1 more source
Smart Catheters for Diagnosis, Monitoring, and Therapy
This study presents a comprehensive review of smart catheters, an emerging class of medical devices that integrate embedded sensors, robotics, and communication systems, offering increased functionality and complexity to enable real‐time health monitoring, diagnostics, and treatment. Abstract This review explores smart catheters as an emerging class of
Azra Yaprak Tarman +12 more
wiley +1 more source
The mechanism of quantum mechanics is considered as the principal method of quantum key distribution for transmitting a cryptographic key between users in unconditionally secure communication.
Omar Sh. Mustafa +2 more
doaj +1 more source
Minimal hardware, binary sequence pseudonoise generator and detector [PDF]
General purpose sequence generator which includes 35-stage field shift register determines mathematical properties of polynomials such as divisibility, period, order of roots, and other parameters that effect desirability of various sequences for ...
Perlman, M.
core +1 more source
This review explores the evolving role of microneedle systems in psoriasis management, highlighting their potential for enhanced drug delivery, diagnosis, and disease monitoring. It also discusses unmet clinical needs for psoriasis management and technical challenges, while outlining strategic directions to advance microneedle integration into routine ...
Fatma Moawad +3 more
wiley +1 more source
SYNTHESIS OF PRIMITIVE MATRICES OVER A FINITE GALOIS FIELDS AND THEIR APPLICATIONS
The algorithms for constructing generalized primitive matrices Galois and Fibonacci arbitrary order , the items belong to the prime field , . The examples of application of these matrices in the problems of the synthesis of generalized linear shift ...
A.J. Beletsky, А.А. Beletsky
doaj
Linkable Ring Signatures from Linear Feedback Shift Register [PDF]
Linkable ring signatures can simultaneously provide the properties of anonymity, spontaneity as well as linkability. Linear feedback shift register (LFSR) sequence can be used to shorten the representation of elements in a field. This paper proposes an LFSR-based linkable ring signature scheme, whose main computation operations are performed in base ...
Dong Zheng +3 more
openaire +1 more source
This review examines how emerging enabling technologies enhance the physiological relevance, scalability, and reproducibility of kidney organoids, while advanced analytical approaches support model validation and deepen mechanistic insight into nephrotoxicity.
Helen Kearney +3 more
wiley +1 more source
Non-linear M -sequences Generation Method
The article deals with a new method for modeling a pseudorandom number generator based on R-blocks. The gist of the method is the replacement of a multi digit XOR element by a stochastic adder in a parallel binary linear feedback shift register scheme.
Z. R. Garifullina +3 more
doaj
Observations on TETRA Encryption Algorithm TEA-3
We present a number of observations on TEA-3, a stream cipher used in TETRA radio networks that was kept secret until recently. While the same also holds for the six other TETRA encryption algorithms, we pick TEA-3 to start with, as (i) it is not ...
Jens Alich +8 more
doaj +1 more source

