Results 21 to 30 of about 5,615 (205)
This study aims to describe how the application of Islamic and Indonesian values in the Hague Indonesian School (SIDH) as a pillar of Islamic character education.
Khobli Arofad +3 more
doaj +1 more source
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
Abstract In this survey, the authors review the main quantum algorithms for solving the computational problems that serve as hardness assumptions for cryptosystem. To this end, the authors consider both the currently most widely used classically secure cryptosystems, and the most promising candidates for post‐quantum secure cryptosystems.
J.‐F. Biasse +4 more
wiley +1 more source
With the rapid development of Internet of Things (IoT), designing a secure two‐factor authentication scheme for IoT is becoming increasingly demanding. Two‐factor protocols are deployed to achieve a higher security level than single‐factor protocols.
Behnam Zahednejad +4 more
wiley +1 more source
IMPLEMENTASI PENDIDIKAN AGAMA ISLAM SEKOLAH INDONESIA DEN HAAG
: This journal discusses the implementation of Islamic education at the Elementary School level at the Indonesian School in The Hague. The background of this journal is the importance of Islamic Religious Education for elementary level students.
Ahmad Lutfi Haqi +4 more
doaj +1 more source
Abstract The mitochondrion is an important signaling hub that governs diverse cellular functions, including metabolism, energy production, and immunity. Among the hundreds of effectors translocated into host cells by the Dot/Icm system of Legionella pneumophila, several are targeted to mitochondria but the function of most of them remains elusive.
Jiaqi Fu +6 more
wiley +1 more source
Complete Analysis of Implementing Isogeny-Based Cryptography Using Huff Form of Elliptic Curves
In this paper, we present the analysis of Huff curves for implementing isogeny-based cryptography. In this regard, we first investigate the computational cost of the building blocks when compression functions are used for Huff curves.
Suhri Kim
doaj +1 more source
Recent advances in structural studies of the Legionella pneumophila Dot/Icm type IV secretion system
Abstract The intracellular bacterial pathogen Legionella pneumophila utilizes the Dot/Icm type IV secretion system to translocate approximately 300 effector proteins to establish a replicative niche known as the Legionella‐containing vacuole. The Dot/Icm system is classified as a type IVB secretion system, which is evolutionarily closely related to the
Tomoe Kitao, Tomoko Kubori, Hiroki Nagai
wiley +1 more source
Scalar multiplications are considered an essential aspect of implementations of isogeny‐based cryptography. The efficiency of scalar multiplication depends on the equation of the underlying elliptic curves and the addition chain employed. Bos and Friedberger recently stated that, for larger scalar multiplication, addition‐subtraction chains will become
Sookyung Eom +3 more
wiley +1 more source
El artículo trata de analizar la Transición Jurídica decenal de las instituciones en el SIDH, como sistema normativo sobre la protección a los derechos humanos en el continente americano.
Henry Javier Valle Benedetti +2 more
doaj +3 more sources
Enrichment of dimerumic acid in Monascus‐fermented rice and its in vivo antioxidant activity
M. Pilosus Fermented rice Dimerumic acid (DMA) In vivo activity of DMA SOD GSH Catalase TBARS Iron chelation assay Antioxidant assay In vitro activity of DMA HPTLC based quantification of DMA Abstract Monascus‐fermented rice (MFR) has been used in traditional Chinese and Japanese medicine for the revitalization of blood, digestion problems, and ...
Washim Khan +2 more
wiley +1 more source

