Results 41 to 50 of about 10,903,755 (367)

Analysis of the Fault Attack ECDLP over Prime Field

open access: yesJournal of Applied Mathematics, 2011
In 2000, Biehl et al. proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. An elliptic curve E is defined over prime field 𝔽p with base point P∈E(𝔽p).
Mingqiang Wang, Tao Zhan
doaj   +1 more source

Estimates for parameters and characteristics of the confining SU(3)-gluonic field in an $\eta^\prime$-meson

open access: yes, 2008
The confinement mechanism proposed earlier by the author is applied to estimate the possible parameters of the confining SU(3)-gluonic field in an $\eta^\prime$-meson.
  +16 more
core   +1 more source

Explicit decomposition of a rational prime in a cubic field

open access: yesInternational Journal of Mathematics and Mathematical Sciences, 2006
We give the explicit decomposition of the principal ideal 〈p〉 (p prime) in a cubic field.
Saban Alaca   +2 more
doaj   +1 more source

Effective log-free zero density estimates for automorphic $L$-functions and the Sato-Tate conjecture

open access: yes, 2016
Let $K/\mathbb{Q}$ be a number field. Let $\pi$ and $\pi^\prime$ be cuspidal automorphic representations of $\mathrm{GL}_d(\mathbb{A}_K)$ and $\mathrm{GL}_{d^\prime}(\mathbb{A}_K)$, and suppose that either both $d$ and $d'$ are at most 2 or at least one ...
Oliver, Robert J. Lemke, Thorner, Jesse
core   +1 more source

Tanner (3, 23)-Regular QC-LDPC Codes: Cycle Structure and Girth Distribution

open access: yesIEEE Access
This paper studies a class of quasi-cyclic LDPC (QC-LDPC) codes, i.e., Tanner (3, 23)-regular QC-LDPC codes of code length $23p$ with $p$ being a prime and $p \equiv 1 (\mathrm {mod} 69)$ .
Qi Wang   +5 more
doaj   +1 more source

A high speed processor for elliptic curve cryptography over NIST prime field

open access: yesIET Circuits, Devices and Systems, 2022
Elliptic curve cryptography (ECC), as one of the public key cryptography systems, has been widely applied to many security applications. It is challenging to implement a scalar multiplication (SM) operation which has the highest computational complexity ...
Xianghong Hu   +4 more
doaj   +1 more source

Uniformly accelerated observer in a thermal bath

open access: yes, 2013
We investigate the quantum field aspects in flat spacetime for an uniformly accelerated observer moving in a thermal bath. In particular, we obtain an exact closed expression of the reduced density matrix for an uniformly accelerated observer with ...
Kolekar, Sanved
core   +1 more source

Mersenne Primes in Real Quadratic Fields

open access: yes, 2012
The concept of Mersenne primes is studied in real quadratic fields of class number 1. Computational results are given. The field $Q(\sqrt{2})$ is studied in detail with a focus on representing Mersenne primes in the form $x^{2}+7y^{2}$. It is also proved that $x$ is divisible by 8 and $y\equiv \pm3\pmod{8}$ generalizing the result of F Lemmermeyer ...
Palimar, Sushma, Shankar, B. R.
openaire   +3 more sources

Big Prime Field FFT on Multi-core Processors

open access: yesInternational Symposium on Symbolic and Algebraic Computation, 2019
We report on a multi-threaded implementation of Fast Fourier Transforms over generalized Fermat prime fields. This work extends a previous study realized on graphics processing units to multi-core processors.
S. Covanov   +3 more
semanticscholar   +1 more source

By dawn or dusk—how circadian timing rewrites bacterial infection outcomes

open access: yesFEBS Letters, EarlyView.
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy