Results 71 to 80 of about 200 (167)
A quantum-inspired probabilistic prime factorization based on virtually connected Boltzmann machine and probabilistic annealing. [PDF]
Jung H +6 more
europepmc +1 more source
Fast Constant-Time Modular Inversion over Fp Resistant to Simple Power Analysis Attacks for IoT Applications. [PDF]
Sghaier A +5 more
europepmc +1 more source
Improving the efficiency of using multivalued logic tools. [PDF]
Suleimenov IE +3 more
europepmc +1 more source
The influence of random number generation in dissipative particle dynamics simulations using a cryptographic hash function. [PDF]
Okada K, Brumby PE, Yasuoka K.
europepmc +1 more source
Post-Quantum Security: Opportunities and Challenges. [PDF]
Li S +7 more
europepmc +1 more source
Shannon Entropy Loss in Mixed-Radix Conversions. [PDF]
Vennos A, Michaels A.
europepmc +1 more source
An Algebraic Approach to Symmetric Linear Layers in Cryptographic Primitives
Subroto RC.
europepmc +1 more source
Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET. [PDF]
Shukla M, Joshi BK, Singh U.
europepmc +1 more source
This paper tackles a longstanding problem in number theory: the existence of odd perfect numbers. A perfect number is defined as a positive integer whose sum of all its proper divisors (excluding itself) is equal to twice the number itself. While Euclid demonstrated a method to construct even perfect numbers using Mersenne primes (primes of the form $2^
openaire +1 more source

