Results 71 to 80 of about 451,593 (141)
Conic curve encryption and digital signature based on complex number theory for cybersecurity applications. [PDF]
Kamal A +3 more
europepmc +1 more source
Extending the IEEE 802.15.4 security suite with a compact implementation of the NIST P-192/B-163 elliptic curves. [PDF]
de la Piedra A, Braeken A, Touhafi A.
europepmc +1 more source
Locally Decodable Codes From Nice Subsets of Finite Fields and Prime Factors of Mersenne Numbers [PDF]
Kiran S. Kedlaya, Sergey Yekhanin
openalex +1 more source
Joint assembly and genetic mapping of the Atlantic horseshoe crab genome reveals ancient whole genome duplication. [PDF]
Nossa CW +6 more
europepmc +1 more source
A new multiple image encryption algorithm using hyperchaotic systems, SVD, and modified RC5. [PDF]
Alexan W +6 more
europepmc +1 more source

