Results 11 to 20 of about 832,547 (326)

Pairing pythagorean pairs

open access: yesJournal of Number Theory, 2022
11 ...
Lorenz Halbeisen, Norbert Hungerbühler
openaire   +4 more sources

Pairing the Volcano [PDF]

open access: yesMathematics of Computation, 2010
Isogeny volcanoes are graphs whose vertices are elliptic curves and whose edges are $\ell$-isogenies. Algorithms allowing to travel on these graphs were developed by Kohel in his thesis (1996) and later on, by Fouquet and Morain (2001). However, up to now, no method was known, to predict, before taking a step on the volcano, the direction of this step.
Sorina Ionica   +2 more
openaire   +4 more sources

Contact pairs [PDF]

open access: yesTohoku Mathematical Journal, 2005
15 ...
BANDE, GIANLUCA, HADJAR A.
openaire   +4 more sources

Microfluidic Device for Droplet Pairing by Combining Droplet Railing and Floating Trap Arrays

open access: yesMicromachines, 2021
Droplet microfluidics are characterized by the generation and manipulation of discrete volumes of solutions, generated with the use of immiscible phases. Those droplets can then be controlled, transported, analyzed or their content modified. In this wide
Margaux Duchamp   +5 more
doaj   +1 more source

Odd-parity superconductivity in the vicinity of inversion symmetry breaking in spin-orbit-coupled systems [PDF]

open access: yes, 2015
We study superconductivity in spin-orbit-coupled systems in the vicinity of inversion symmetry breaking. We find that due to the presence of spin-orbit coupling, fluctuations of the incipient parity-breaking order generate an attractive pairing ...
Fu, Liang, Kozii, Vladyslav
core   +4 more sources

Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions

open access: yesCryptography, 2023
A two-party authenticated key exchange (AKE) protocol allows each of the two parties to share a common secret key over insecure channels, even in the presence of active adversaries who can actively control and modify the exchanged messages.
Janaka Alawatugoda
doaj   +1 more source

Certificate-based cross-domain authentication scheme with anonymity

open access: yes网络与信息安全学报, 2018
Considered the cross-domain authentication of mobile devices in the Internet of things,a certificate based anonymous cross-domain authentication scheme was proposed.First,combined with the characteristics of PKI and IBS,a certificate based signature (CBS)
Yongshan DING,Lixin LI,Zuohui LI
doaj   +3 more sources

Un nuevo emparejamiento gladiatorio procedente de Éfeso = A New Gladiatorial Pairing from Ephesus

open access: yesEspacio, Tiempo y Forma. Serie II, Historia Antigua, 2015
Esta breve noticia pretende dar a conocer un inédito y fracturado bajorrelieve con inscripción cuya singularidad radica en que se erige como el único testimonio iconográfico fehaciente del enfrentamiento entre dos categorías raramente emparejadas: el ...
Pablo Molina Ortiz
doaj   +1 more source

Mixing and Matching Chromosomes during Female Meiosis

open access: yesCells, 2020
Meiosis is a key event in the manufacturing of an oocyte. During this process, the oocyte creates a set of unique chromosomes by recombining paternal and maternal copies of homologous chromosomes, and by eliminating one set of chromosomes to become ...
Thomas Rubin   +2 more
doaj   +1 more source

Impacto de los Servicios de Agua y Saneamiento sobre las enfermedades diarreicas em los niños de la Sierra del Perú

open access: yesRevista de Análisis Económico y Financiero, 2022
Drinking water is important for human life. Goal 6 of the SDGs indicates ensuring the availability and sustainable management of water and sanitation and good water quality for all. The lack of water resources, low water quality and inadequate sanitation
Carmen Vanessa Montero Contreras
doaj   +1 more source

Home - About - Disclaimer - Privacy