Fast Parallel Molecular Algorithms for DNA-Based Computation: Solving the Elliptic Curve Discrete Logarithm Problem over GF(2n)
Elliptic curve cryptographic algorithms convert input data to unrecognizable encryption and the unrecognizable data back again into its original decrypted form. The security of this form of encryption hinges on the enormous difficulty that is required to solve the elliptic curve discrete logarithm p...
        Saved in:
      
    
          | Published in | BioMed research international Vol. 2008; no. 2008; pp. 1 - 10 | 
|---|---|
| Main Authors | , , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
        Cairo, Egypt
          Hindawi Publishing Corporation
    
        01.01.2008
     John Wiley & Sons, Inc Hindawi Limited  | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 2314-6133 1110-7243 2314-6141 2314-6141 1110-7251  | 
| DOI | 10.1155/2008/518093 | 
Cover
| Abstract | Elliptic curve cryptographic algorithms convert input data to unrecognizable encryption and the unrecognizable data back again into its original decrypted form. The security of this form of encryption hinges on the enormous difficulty that is required to solve the elliptic curve discrete logarithm problem (ECDLP), especially over GF(2n), n∈Z+. This paper describes an effective method to find solutions to the ECDLP by means of a molecular computer. We propose that this research accomplishment would represent a breakthrough for applied biological computation and this paper demonstrates that in principle this is possible. Three DNA-based algorithms: a parallel adder, a parallel multiplier, and a parallel inverse over GF(2n) are described. The biological operation time of all of these algorithms is polynomial with respect to n. Considering this analysis, cryptography using a public key might be less secure. In this respect, a principal contribution of this paper is to provide enhanced evidence of the potential of molecular computing to tackle such ambitious computations. | 
    
|---|---|
| AbstractList | Elliptic curve cryptographic algorithms convert input data to unrecognizable encryption and the unrecognizable data back again into its original decrypted form. The security of this form of encryption hinges on the enormous difficulty that is required to solve the elliptic curve discrete logarithm problem (ECDLP), especially over GF(2n), n ∈ Z+. This paper describes an effective method to find solutions to the ECDLP by means of a molecular computer. We propose that this research accomplishment would represent a breakthrough for applied biological computation and this paper demonstrates that in principle this is possible. Three DNA-based algorithms: a parallel adder, a parallel multiplier, and a parallel inverse over GF(2n) are described. The biological operation time of all of these algorithms is polynomial with respect to n. Considering this analysis, cryptography using a public key might be less secure. In this respect, a principal contribution of this paper is to provide enhanced evidence of the potential of molecular computing to tackle such ambitious computations. Elliptic curve cryptographic algorithms convert input data to unrecognizable encryption and the unrecognizable data back again into its original decrypted form. The security of this form of encryption hinges on the enormous difficulty that is required to solve the elliptic curve discrete logarithm problem (ECDLP), especially over GF([2.sup.n]), n ∈ [Z.sup.+]. This paper describes an effective method to find solutions to the ECDLP by means of a molecular computer. We propose that this research accomplishment would represent a breakthrough for applied biological computation and this paper demonstrates that in principle this is possible. Three DNA-based algorithms: a parallel adder, a parallel multiplier, and a parallel inverse over GF([2.sup.n]) are described. The biological operation time of all of these algorithms is polynomial with respect to n. Considering this analysis, cryptography using a public key might be less secure. In this respect, a principal contribution of this paper is to provide enhanced evidence of the potential of molecular computing to tackle such ambitious computations. Elliptic curve cryptographic algorithms convert input data to unrecognizable encryption and the unrecognizable data back again into its original decrypted form. The security of this form of encryption hinges on the enormous difficulty that is required to solve the elliptic curve discrete logarithm problem (ECDLP), especially over GF(2n), n∈Z+. This paper describes an effective method to find solutions to the ECDLP by means of a molecular computer. We propose that this research accomplishment would represent a breakthrough for applied biological computation and this paper demonstrates that in principle this is possible. Three DNA-based algorithms: a parallel adder, a parallel multiplier, and a parallel inverse over GF(2n) are described. The biological operation time of all of these algorithms is polynomial with respect to n. Considering this analysis, cryptography using a public key might be less secure. In this respect, a principal contribution of this paper is to provide enhanced evidence of the potential of molecular computing to tackle such ambitious computations. Elliptic curve cryptographic algorithms convert input data to unrecognizable encryption and the unrecognizable data back again into its original decrypted form. The security of this form of encryption hinges on the enormous difficulty that is required to solve the elliptic curve discrete logarithm problem (ECDLP), especially over GF([superscript]2n[/superscript] ) , n∈[superscript]Z+[/superscript] . This paper describes an effective method to find solutions to the ECDLP by means of a molecular computer. We propose that this research accomplishment would represent a breakthrough for applied biological computation and this paper demonstrates that in principle this is possible. Three DNA-based algorithms: a parallel adder, a parallel multiplier, and a parallel inverse over GF([superscript]2n[/superscript] ) are described. The biological operation time of all of these algorithms is polynomial with respect to n . Considering this analysis, cryptography using a public key might be less secure. In this respect, a principal contribution of this paper is to provide enhanced evidence of the potential of molecular computing to tackle such ambitious computations.  | 
    
| Audience | Academic | 
    
| Author | Zou, Shuting Xv, Jin Li, Kenli  | 
    
| AuthorAffiliation | 2 Department of Control Science and Engineering, Huazhong University of Science and Technology, Wuhan 430074, China 1 Embedded System and Networking Laboratory, College of Computer and Communication, Hunan University, Changsha 410082, China  | 
    
| AuthorAffiliation_xml | – name: 2 Department of Control Science and Engineering, Huazhong University of Science and Technology, Wuhan 430074, China – name: 1 Embedded System and Networking Laboratory, College of Computer and Communication, Hunan University, Changsha 410082, China  | 
    
| Author_xml | – sequence: 1 fullname: Li, Kenli – sequence: 2 fullname: Xv, Jin – sequence: 3 fullname: Zou, Shuting  | 
    
| BookMark | eNqFkkFv1DAQhSNUREvpiTOSRS-AmtaOncThgLRsuwVpgUrA2Zoks1lXjh2cZKue-Ot4SbVSpZVqHzzyfO9Z8-SX0YF1FqPoNaPnjKXpRUKpvEiZpAV_Fh0lnIk4Y4Id7GrOD6OTvr-lYUmW0SJ7ER0yKUI3ZUfR3wX0A7kBD8agId-cwWo04MnMNM7rYd32ZOU8ufw-iz9DjzWZu7YbBxi0sx_JT2c22jZkWCO5MkZ3g67IfPQbJJe6rzwOSJaugf9O5Ma70mBL3AY9uV68S-z7V9HzFZgeTx7O4-j34urX_Eu8_HH9dT5bxih4NsQgGWQ5ykwUUBRlWUBOAYFjVVYyY2UZmlklaSlqmjLO6prnXCS8rkACCMmPo7PJd7Qd3N-FaVXndQv-XjGqtlGqbZRqijLgnya8G8sW6wrtEBLaSRxo9bhj9Vo1bqOSpEikEMHg7YOBd39G7Ad160Zvw4hKpjmnaSKTAJ1OUAMGlbYrF7yqNgSnZqzgKaOSb6l4D9WgxfBw-A0rHa4f8ed7-LBrbHW1V_BhEqy1reFOP5HMmwnGgOAKdnAh8zzP-D9S68q5 | 
    
| ContentType | Journal Article | 
    
| Copyright | Copyright © 2008 COPYRIGHT 2008 John Wiley & Sons, Inc. COPYRIGHT 2008 Hindawi Limited Copyright © 2008 Kenli Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Copyright © 2008 Kenli Li et al. 2008  | 
    
| Copyright_xml | – notice: Copyright © 2008 – notice: COPYRIGHT 2008 John Wiley & Sons, Inc. – notice: COPYRIGHT 2008 Hindawi Limited – notice: Copyright © 2008 Kenli Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. – notice: Copyright © 2008 Kenli Li et al. 2008  | 
    
| DBID | ADJCN AHFXO RHU RHW RHX 3V. 7QL 7QO 7T7 7TK 7U7 7U9 7X7 7XB 88E 8FD 8FE 8FG 8FH 8FI 8FJ 8FK ABUWG AFKRA ARAPS AZQEC BBNVY BENPR BGLVJ BHPHI C1K CCPQU CWDGH DWQXO FR3 FYUFA GHDGH GNUQQ H94 HCIFZ K9. LK8 M0S M1P M7N M7P P5Z P62 P64 PHGZM PHGZT PIMPY PJZUB PKEHL PPXIY PQEST PQGLB PQQKQ PQUKI PRINS 5PM ADTOC UNPAY  | 
    
| DOI | 10.1155/2008/518093 | 
    
| DatabaseName | الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete Hindawi Publishing Complete Hindawi Publishing Subscription Journals Hindawi Publishing Open Access ProQuest Central (Corporate) Bacteriology Abstracts (Microbiology B) Biotechnology Research Abstracts Industrial and Applied Microbiology Abstracts (Microbiology A) Neurosciences Abstracts Toxicology Abstracts Virology and AIDS Abstracts Health & Medical Collection (Proquest) ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Natural Science Journals Hospital Premium Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials Biological Science Collection ProQuest Central ProQuest Technology Collection Natural Science Collection Environmental Sciences and Pollution Management ProQuest One Community College Middle East & Africa Database ProQuest Central Engineering Research Database Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Central Student AIDS and Cancer Research Abstracts SciTech Premium Collection ProQuest Health & Medical Complete (Alumni) Biological Sciences ProQuest Health & Medical Collection Medical Database Algology Mycology and Protozoology Abstracts (Microbiology C) Biological Science Database (Proquest) Advanced Technologies & Aerospace Collection ProQuest Advanced Technologies & Aerospace Collection Biotechnology and BioEngineering Abstracts ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China PubMed Central (Full Participant titles) Unpaywall for CDI: Periodical Content Unpaywall  | 
    
| DatabaseTitle | Publicly Available Content Database ProQuest Central Student ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials SciTech Premium Collection ProQuest Central China Environmental Sciences and Pollution Management ProQuest One Applied & Life Sciences Health Research Premium Collection Natural Science Collection Health & Medical Research Collection Biological Science Collection Industrial and Applied Microbiology Abstracts (Microbiology A) ProQuest Central (New) ProQuest Medical Library (Alumni) Advanced Technologies & Aerospace Collection Virology and AIDS Abstracts ProQuest Biological Science Collection ProQuest One Academic Eastern Edition ProQuest Hospital Collection ProQuest Technology Collection Health Research Premium Collection (Alumni) Biological Science Database Neurosciences Abstracts ProQuest Hospital Collection (Alumni) Biotechnology and BioEngineering Abstracts ProQuest Health & Medical Complete ProQuest One Academic UKI Edition Engineering Research Database ProQuest One Academic ProQuest One Academic (New) Technology Collection Technology Research Database ProQuest One Academic Middle East (New) ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Natural Science Collection ProQuest Central ProQuest Health & Medical Research Collection Middle East & Africa Database Biotechnology Research Abstracts Health and Medicine Complete (Alumni Edition) ProQuest Central Korea Bacteriology Abstracts (Microbiology B) Algology Mycology and Protozoology Abstracts (Microbiology C) AIDS and Cancer Research Abstracts Toxicology Abstracts ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest Medical Library ProQuest Central (Alumni)  | 
    
| DatabaseTitleList | Publicly Available Content Database  | 
    
| Database_xml | – sequence: 1 dbid: RHX name: Hindawi Publishing Open Access url: http://www.hindawi.com/journals/ sourceTypes: Publisher – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 3 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Medicine | 
    
| EISSN | 2314-6141 1110-7251  | 
    
| Editor | Howard, Daniel | 
    
| Editor_xml | – sequence: 1 givenname: Daniel surname: Howard fullname: Howard, Daniel  | 
    
| EndPage | 10 | 
    
| ExternalDocumentID | 10.1155/2008/518093 PMC2292844 2294417301 A193510832 10_1155_2008_518093 987776  | 
    
| GeographicLocations | China | 
    
| GeographicLocations_xml | – name: China | 
    
| GroupedDBID | 04C 0R~ 24P 4.4 53G 5VS 7X7 88E 8FE 8FG 8FH 8FI 8FJ AAFWJ AAMMB AAWTL ABDBF ABUWG ACCMX ACIWK ACPRK ACUHS ADBBV ADJCN ADOJX ADRAZ AEFGJ AENEX AFKRA AFRAH AGXDD AHFXO AHMBA AIDQK AIDYY ALMA_UNASSIGNED_HOLDINGS AOIJS ARAPS BAWUL BBNVY BCNDV BENPR BGLVJ BHPHI BMSDO BPHCQ BVXVI CCPQU CWDGH DIK EAD EAP EAS EBD EBS ECF ECT EIHBH EJD EMB EMK EMOBN ESX FYUFA H13 HCIFZ HMCUK HYE IAO IHR INR KQ8 LK8 M1P M48 M7P ML0 ML~ P62 PGMZT PHGZM PHGZT PIMPY PJZUB PPXIY PQGLB PQQKQ PROAC PSQYO PUEGO RPM SV3 TUS UKHRP --- 29K 2WC 36B 5GY 6PF 8R4 8R5 AAJEY ADDVE CS3 D-I DU5 E3Z F5P GROUPED_DOAJ IAG IEA IL9 INH IOF ISR ITC O5R O5S OK1 P2P Q2X RHU RHW RHX TR2 W2D WOQ WOW WQ9 XSB OVT 3V. 7QL 7QO 7T7 7TK 7U7 7U9 7XB 8FD 8FK AZQEC C1K DWQXO FR3 GNUQQ H94 K9. M7N P64 PKEHL PQEST PQUKI PRINS 5PM ADTOC AFFHD ALUQN UNPAY  | 
    
| ID | FETCH-LOGICAL-e436t-a81a67e8649a99bb9a70aea3ecbc861bb67e6c80b4d05131dd373423dca8aa483 | 
    
| IEDL.DBID | M48 | 
    
| ISSN | 2314-6133 1110-7243 2314-6141  | 
    
| IngestDate | Wed Oct 29 11:38:38 EDT 2025 Tue Sep 30 16:51:23 EDT 2025 Tue Oct 07 05:40:27 EDT 2025 Mon Oct 20 22:48:19 EDT 2025 Fri Jun 13 00:08:18 EDT 2025 Mon Oct 20 16:56:20 EDT 2025 Sun Jun 02 18:53:09 EDT 2024 Thu Sep 25 15:08:22 EDT 2025  | 
    
| IsDoiOpenAccess | true | 
    
| IsOpenAccess | true | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 2008 | 
    
| Language | English | 
    
| License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. cc-by  | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-e436t-a81a67e8649a99bb9a70aea3ecbc861bb67e6c80b4d05131dd373423dca8aa483 | 
    
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 Recommended by Daniel Howard  | 
    
| OpenAccessLink | http://journals.scholarsportal.info/openUrl.xqy?doi=10.1155/2008/518093 | 
    
| PMID | 18431451 | 
    
| PQID | 857305282 | 
    
| PQPubID | 237798 | 
    
| PageCount | 10 | 
    
| ParticipantIDs | unpaywall_primary_10_1155_2008_518093 pubmedcentral_primary_oai_pubmedcentral_nih_gov_2292844 proquest_journals_857305282 gale_infotracmisc_A193510832 gale_infotracgeneralonefile_A193510832 gale_infotracacademiconefile_A193510832 hindawi_primary_10_1155_2008_518093 emarefa_primary_987776  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2008-01-01 | 
    
| PublicationDateYYYYMMDD | 2008-01-01 | 
    
| PublicationDate_xml | – month: 01 year: 2008 text: 2008-01-01 day: 01  | 
    
| PublicationDecade | 2000 | 
    
| PublicationPlace | Cairo, Egypt | 
    
| PublicationPlace_xml | – name: Cairo, Egypt – name: New York  | 
    
| PublicationTitle | BioMed research international | 
    
| PublicationYear | 2008 | 
    
| Publisher | Hindawi Publishing Corporation John Wiley & Sons, Inc Hindawi Limited  | 
    
| Publisher_xml | – name: Hindawi Publishing Corporation – name: John Wiley & Sons, Inc – name: Hindawi Limited  | 
    
| References | FeynmanR. P.GilbertD. H.There's plenty of room at the bottomMinaturization1961New York, NY, USAReinhold282296 WatsonJ.GilmanM.WitkowskiJ.ZollerM.Recombinant DNA19922ndSan Francisco, Calif, USAFreeman (3) 1987; 48 BlackburnG. M.GaitM. J.Nucleic Acids in Chemistry and Biology1990Washington, DC, USAIRL Press (13) 2004; 30 SindenR. R.DNA Structure and Function1994New York, NY, USAAcademic Press MillerV. S.Use of elliptic curves in cryptographyProceedings of the 5th Annual International Cryptology Conference (CRYPTO '85)August 1985Santa Barbara, Calif, USA LangS.Elliptic Curves: Diophantine Analysis1978New York, NY, USASpringer KobliztN.Introduction to Elliptic Curves and Modular Forms1984New York, NY, USASpringer (14) 2005; 80 WienerM.ZuccheratoR.Faster attacks on elliptic curve cryptosystemsSelected Areas in Cryptography19991556New York, NY, USASpringer190200Lecture Notes in Computer Science10.1007/3-540-48892-8_15 WatsonJ.HoplinsN.RobertsJ.SteitzJ.WeinerA.Molecular Biology of the Gene1987Menlo Park, Calif, USABenjamin/Cummings (16) 2005; 4 OdlyzkoA. M.Discrete logarithms in finite fields and their cryptographic significanceProceedings of the 2nd Workshop on Advances in Cryptology: Theory and Application of Cryptographic Techniques (EUROCRYPT '84)April 1985Paris, FranceSpringer224314 EcksteinF.Oligonucleotides and Anologues1991Oxford, UKOxford University Press (9) 1995; 268 (1) 1994; 266 (2) 1996; 15 BonehD.DunworthC.LiptonR. J.Breaking DES using a molecular computer1995CS-TR-489-95Princeton, NJ, USAPrinceton University (12) 2004; 73 PaunG.RozenbergG.SalomaaA.DNA Computing: New Computing Paradigms1998New York, NY, USASpringer  | 
    
| References_xml | – reference: WatsonJ.GilmanM.WitkowskiJ.ZollerM.Recombinant DNA19922ndSan Francisco, Calif, USAFreeman – reference: PaunG.RozenbergG.SalomaaA.DNA Computing: New Computing Paradigms1998New York, NY, USASpringer – reference: BlackburnG. M.GaitM. J.Nucleic Acids in Chemistry and Biology1990Washington, DC, USAIRL Press – volume: 268 start-page: 542 issue: 5210 year: 1995 end-page: 545 ident: 9 article-title: DNA solution of hard computational problems – reference: EcksteinF.Oligonucleotides and Anologues1991Oxford, UKOxford University Press – volume: 266 start-page: 1021 issue: 5187 year: 1994 end-page: 1024 ident: 1 article-title: Molecular computation of solutions to combinatorial problems – volume: 30 start-page: 1109 issue: 9-10 year: 2004 end-page: 1125 ident: 13 article-title: Fast parallel molecular solution to the dominating-set problem on massively parallel bio-computing – reference: SindenR. R.DNA Structure and Function1994New York, NY, USAAcademic Press – reference: BonehD.DunworthC.LiptonR. J.Breaking DES using a molecular computer1995CS-TR-489-95Princeton, NJ, USAPrinceton University – reference: WienerM.ZuccheratoR.Faster attacks on elliptic curve cryptosystemsSelected Areas in Cryptography19991556New York, NY, USASpringer190200Lecture Notes in Computer Science10.1007/3-540-48892-8_15 – volume: 80 start-page: 233 issue: 3 year: 2005 end-page: 250 ident: 14 article-title: Fast parallel molecular solutions for DNA-based supercomputing: the subset-product problem – reference: MillerV. S.Use of elliptic curves in cryptographyProceedings of the 5th Annual International Cryptology Conference (CRYPTO '85)August 1985Santa Barbara, Calif, USA – reference: WatsonJ.HoplinsN.RobertsJ.SteitzJ.WeinerA.Molecular Biology of the Gene1987Menlo Park, Calif, USABenjamin/Cummings – volume: 48 start-page: 203 issue: 177 year: 1987 end-page: 209 ident: 3 article-title: Elliptic curve cryptosystems – reference: OdlyzkoA. M.Discrete logarithms in finite fields and their cryptographic significanceProceedings of the 2nd Workshop on Advances in Cryptology: Theory and Application of Cryptographic Techniques (EUROCRYPT '84)April 1985Paris, FranceSpringer224314 – volume: 4 start-page: 149 issue: 2 year: 2005 end-page: 163 ident: 16 article-title: Fast parallel molecular algorithms for DNA-based computation: factoring integers – reference: FeynmanR. P.GilbertD. H.There's plenty of room at the bottomMinaturization1961New York, NY, USAReinhold282296 – reference: KobliztN.Introduction to Elliptic Curves and Modular Forms1984New York, NY, USASpringer – volume: 15 start-page: 211 issue: 2-3 year: 1996 end-page: 232 ident: 2 article-title: Test tube distributed systems based on splicing – volume: 73 start-page: 117 issue: 2 year: 2004 end-page: 130 ident: 12 article-title: Molecular solutions for the subset-sum problem on DNA-based supercomputing – reference: LangS.Elliptic Curves: Diophantine Analysis1978New York, NY, USASpringer  | 
    
| SSID | ssj0000816096 ssj0017869  | 
    
| Score | 1.8811697 | 
    
| Snippet | Elliptic curve cryptographic algorithms convert input data to unrecognizable encryption and the unrecognizable data back again into its original decrypted... | 
    
| SourceID | unpaywall pubmedcentral proquest gale hindawi emarefa  | 
    
| SourceType | Open Access Repository Aggregation Database Publisher  | 
    
| StartPage | 1 | 
    
| SubjectTerms | Algorithms Biomedical research Curves, Elliptic Deoxyribonucleic acid Digital signatures DNA Ellipse Embedded systems Genetic algorithms Molecular dynamics Network security Properties  | 
    
| SummonAdditionalLinks | – databaseName: Hindawi Publishing Open Access dbid: RHX link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Jb9QwFLZoJZYLYqsaWpAl9kPUTLyG29AyjBBTVUCluUXPjjMzUshUs1Bx4q_znLgRKQhxtuNYfrvf8_cIeW44Zyk4GZeJKmLuMNyBQopY6bIx5yKz_kJ_cirH5_zjVExDgez6zxQ-Wrsjn6E_Eh5niu2QHS194dbn8bTLFSjdNK5DoU1ilXIWXuFd-7R5cQtodaBTvjfnPuy9XPScy-ulkbe39QX8uISq-s3ujO6Ru8FhpMOWwvfJDVc_ILcmISX-kPwcwXpDz2Dlm6JUdHLV7pYOq9kSI__5tzVFx5SenA7jd2iyCto2cmgo8pZ-WVb-SoGiH0h9_QZqEEuPt6vvjp4sUKWgT00_LWfQrETP2vYz1Nd90g-j12n95hE5H73_ejyOQ1eF2HEmNzHoAUjltOQZZJkxGagEHDBnjdVyYAwOSqsTwwsUWDYoCqY8TGBhQQNwzfbIbr2s3T6hzHq4PFOKsnRc4GJpUmoFiiemEHpgI7IXzjy_aLEz8szjD8qIvPIkyL0Q4TFbCG8BcFkPR5UP0a1EVkFtE5GXvZmzFoz7bxMPexNRSmxv-FmgdreVJvwRom3E2TJJRA6uOCEPsrzOtUAtKDA0jYjqMUe3kofo7o_Ui3kD1Z2mGdp_HpEXHRv96_-P_2uXB-ROW7XiL4IOye5mtXVP0DXamKeNZPwCvOIG5A priority: 102 providerName: Hindawi Publishing – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Zj9MwELaWrjheENeKsAuyxP0QNYedAwmh7lFWiFYVsNK-RRPbaSuFtLQpK9746czkEkFon-04iT0znhmPv4-xF6kQvgcmsDMn1LYwGO6ADqQdRlm1nctYUUJ_Mg3OL8SnS3m5xybtXRgqq2xtYmWo9UpRjnwYSZRFiQHCh_UPm0ij6HC1ZdCAhllBv68Qxm6wfY-AsQZs__hsOvvSJV2IZcKJa8I5V2DY5PvNnT18bkilAENJgFZ-dT8XcI-CzlTfXFCQfLXsuaL_FlLe3hVr-HUFef7XLjW-x-427iUf1fJwn-2Z4gG7NWkO0B-y32PYlnwGG6JQyfmkJcflo3yOv1suvm85urH8dDqyj3GD07ymfajW7x3_usopAcHRa-RU7YH2RvGT3ean4adLNEDogfPPqzlUI_FZTVbDqUqUfxy_8Qr-9hG7GJ99Ozm3GxIG2wg_KG2IXAhCEwUihjhO0xhCBwz4RqUqCtw0xcZARU4qNOq372rth4QqqBVEACLyD9igWBXmMeO-InS9NJNZZoTEwTwni0IIhZNqGbnKYgfNpCfrGmojiQmuMLDYa1qDhHQO51lBc3UAhyX0qmSEXihKFhoni73q9ZzX2N3_63jU64hKpXrNz5vl7j6lipakrHk7aymx2GErCkmj-tukE1SLhT3p6EYiRO9-S7FcVMjenhejuyAs9rKTo-ve_-Ta9x-yO3VxC-WLjtig3OzMU_SgyvRZoxd_ANwCGF8 priority: 102 providerName: ProQuest – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Zb9NAEB6VVBwv3BWmBa3E_eAkjnd9wFNoCRUiUSSI1EpI1l5OIly7ShwqeIJ_wG_klzBrb6K6QgjxZmlX42NmZ75Zz34D8FhQ6ve4Dty0GyqXakx3uAqYG0ZpFc5ZLM2G_nAUHE7ouyN2tAWv1mdhlKGIL7hatmcmJz2bV97aftdlR5ws5h3zy77DDPEU5oEqvQTbAUMg3oLtyWjcP67ayXkUk6Kqkby9pp49nYcB9LyE6iQux2jEN075sr11A3ReLJm8uspP-dcznmXn4tHgBnxav0ldhvK5vSpFW367QPL4n696E65bnEr6tWHdgi2d34YrQ_sn_g78GPBlScZ8YXqxZGS47rJL-tm0WMzL2cmSIB4mB6P-r-8_X2OsVKTuIFGZwkvyocjMXgZBAEpM4Qi6Lkn2V4svmhzM0ZchmCfviymvZJFx3feGmIJT8nbwvJe_uAuTwZuP-4eubefgauoHpcsjjwehjgIa8zgWIuZhl2vuaylkFHhC4GAgo66gCj2F7ynlh4afUEkecU4jfwdaeZHre0B8aXj6RMrSVFOGwnrdNAp5SLtCsciTDuxYpSanNWlHEhviw8CBZ0bHiVm9qEfJ7SEEFGt4sJI-4lm0UXRzDjxtzJzWLOB_mrjXmIjLUzaGH1n1bh6lyrsYqzuA1sp1YHdtasnaApKIoftlmBM7EDasbyPJcIM3R_L5rOII7_ViBB7UgScbO_3b_e__47xduFYXzJg9qD1olYuVfoCorBQP7er7Dc14NUc priority: 102 providerName: Unpaywall  | 
    
| Title | Fast Parallel Molecular Algorithms for DNA-Based Computation: Solving the Elliptic Curve Discrete Logarithm Problem over GF(2n) | 
    
| URI | https://search.emarefa.net/detail/BIM-987776 https://dx.doi.org/10.1155/2008/518093 https://www.proquest.com/docview/857305282 https://pubmed.ncbi.nlm.nih.gov/PMC2292844 https://downloads.hindawi.com/journals/bmri/2008/518093.pdf  | 
    
| UnpaywallVersion | publishedVersion | 
    
| Volume | 2008 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2314-6141 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000816096 issn: 2314-6141 databaseCode: KQ8 dateStart: 20010101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2314-6141 dateEnd: 20121231 omitProxy: true ssIdentifier: ssj0017869 issn: 2314-6133 databaseCode: KQ8 dateStart: 20010101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2314-6141 dateEnd: 20121127 omitProxy: true ssIdentifier: ssj0017869 issn: 2314-6133 databaseCode: KQ8 dateStart: 20010101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2314-6141 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0017869 issn: 2314-6133 databaseCode: KQ8 dateStart: 20010101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVEBS databaseName: EBSCOhost Academic Search Ultimate customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn eissn: 2314-6141 dateEnd: 20120131 omitProxy: true ssIdentifier: ssj0017869 issn: 2314-6133 databaseCode: ABDBF dateStart: 20060101 isFulltext: true titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn providerName: EBSCOhost – providerCode: PRVBFR databaseName: Free Medical Journals customDbUrl: eissn: 2314-6141 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0017869 issn: 2314-6133 databaseCode: DIK dateStart: 20010101 isFulltext: true titleUrlDefault: http://www.freemedicaljournals.com providerName: Flying Publisher – providerCode: PRVAQN databaseName: PubMed Central customDbUrl: eissn: 2314-6141 dateEnd: 20121231 omitProxy: true ssIdentifier: ssj0017869 issn: 2314-6133 databaseCode: RPM dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.ncbi.nlm.nih.gov/pmc/ providerName: National Library of Medicine – providerCode: PRVPQU databaseName: Health & Medical Collection customDbUrl: eissn: 2314-6141 dateEnd: 20121231 omitProxy: true ssIdentifier: ssj0017869 issn: 2314-6133 databaseCode: 7X7 dateStart: 20070101 isFulltext: true titleUrlDefault: https://search.proquest.com/healthcomplete providerName: ProQuest – providerCode: PRVPQU databaseName: Middle East & Africa Database customDbUrl: eissn: 2314-6141 dateEnd: 20121231 omitProxy: false ssIdentifier: ssj0017869 issn: 2314-6133 databaseCode: CWDGH dateStart: 20070101 isFulltext: true titleUrlDefault: https://search.proquest.com/middleeastafrica providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 2314-6141 dateEnd: 20121231 omitProxy: true ssIdentifier: ssj0017869 issn: 2314-6133 databaseCode: BENPR dateStart: 20070101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 2314-6141 dateEnd: 20121231 omitProxy: true ssIdentifier: ssj0017869 issn: 2314-6133 databaseCode: 8FG dateStart: 20070101 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest – providerCode: PRVFZP databaseName: Scholars Portal Journals: Open Access customDbUrl: eissn: 2314-6141 dateEnd: 20120131 omitProxy: true ssIdentifier: ssj0017869 issn: 2314-6133 databaseCode: M48 dateStart: 20010101 isFulltext: true titleUrlDefault: http://journals.scholarsportal.info providerName: Scholars Portal – providerCode: PRVWIB databaseName: Wiley Online Library Open Access (Activated by CARLI) customDbUrl: eissn: 2314-6141 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000816096 issn: 2314-6141 databaseCode: 24P dateStart: 20010101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bb5swFD7qRd32Mu1WjbWLLO3-wErAxmbSNJGmNJqWKOoWKX1CBkwSiZKOJOv6tL--YyDZqKo97MVI2Bhkn6ttvg_gZUSpY0vlmqnFE5MqTHdk4jKTi7R058yL9YJ-f-D2RvTzmI23YE3GWQ_g4tbUTvNJjYrs_c_v159Q4T-WCs_Ykd7CP2IaiMrZhl10UZ7mcOjTP9sJXJTcdqjXlslt6tQ_6t14WAOICnSoVO9a7qkLiT5Kbkz13lQnyVezRih68yDl3VV-Ka-vZJb95aWCB3C_Di-JX8nDQ9hS-SO406830B_Dr0AulmQoC02hkpH-mhyX-NlkXsyW04sFwTCWdAe-2UEHl5CK9qGcvw_k6zzTCxAEo0aiT3ugvYnJ8ar4oUh3hgYII3DyZT6RZU9kWJHVEH1KlJwGb-383RMYBSffjntmzcFgKuq4S1OKtnS5Ei71pOdFkSe5JZV0VBzFwm1HEVa6sbAimqB6O-0kcbgGFUxiKaSkwtmHnXyeq6dAnFiD60UpS1NFGXZmW6ngklMrSphoxwbs12MeXlZIG6Gn0QpdA97oKQi1EOAwx7L-cwC71eBVoY9BKAoW2iYDXjdaTiro7tsaHjYaok7FjeoX9WxvPqVMlhiraDsreTHgYC0J4VpwQ8HQZjJMZA3gDeHY9KQBvZs1-WxaAnvbtofRAjXg1UaM_vX-Z__9hgO4V5170UtJh7CzLFbqOQZXy6gF2zYdYsnHHEsRnLZg1-90OwFeOyeD4VmrVC0sz3pjvDcaDP3z33VyKNA | 
    
| linkProvider | Scholars Portal | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEB6VVFAuvKuaFlgJWuDgxo9dP5A4hIQ0pUlUqa3ozV2v10lEcELiEJUTf4i_wm9i1nYsXKHeeuC8q7G1_ubp2fkAXoWU2haXjh4bbqRTiekOjxymu16cuXPmC1XQ7_Wdzhn9dM7O1-DX6i6Maqtc2cTMUEcToWrkdY8hFhkmCEUD5ZG8XGJ6Nn9_2MJvuWtZ7Y-nzY5eMAjoktpOqnPP5I4rPYf63PfD0OeuwSW3pQiF55hhiIuO8IyQRghO24wi21Uj8SLBPc6pZ6Pcvek3XZFUqZ-5BWPHLVhHmJtWDdabn1sHnbKoo1gsDD8ntDMppmW2XdwJRLddV60GdaYGZtnZ_V-OPpCXruD2UCXhy1El1L3aqLmxSKb8csnH47-8YPs-_F6dX9788mV_kYb74seV0ZL_zQE_gHtFPE4auQI9hDWZPII7vaLj4DH8bPN5So75THHOjElvxSZMGuMBikuHX-cE437S6jf0DxgRRCTnycgA_46cTMaqYkMwzCaqPQYNtCDNxey7JK0RWmxMWUh3MuCZJHKcs_sQ1VZLDtpvrIS8fQJnN3Ikm1BLJoncAmILNY4wjFkcS8pQmGXEnstdaoQR80yhwWaBomCazyYJfDXf0dHgtQJVoIwUAkfw4q4FilXjvoIGhu2oimjNNdir7Bzkw87_tXGnshGtkKgsvyzwW75Kll4ylhOd5rDXYHuFvaCwlfOgBJ4GbgXupSQ1Ar26koyG2Sh0y_IxvqIa7JaKcd3zn177_Bew0TntdYPuYf9oG-7mnUGq2LYDtXS2kM8w_EzD54XSE7i4ac34A7HylBM | 
    
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1bb9MwFLbGEIMXxG0i2wBLMC4PUdPYjhMkhMpK2dhaVWKT-hYcx2krdWlpU6q98bf4d5yTmwhCe9uzLTuyv3PN8fkIeRVxzlxlPDtxZGxzA-GOij1hSz_JzbkINCb0-wPv-IJ_HYnRFvldvYXBsspKJ-aKOp5rzJG3fAFYFBAgtJKyKmLY7X1c_LCRQAp_tFZsGgVCTs3VBqK31YeTLlz1oev2Pp8fHdslwYBtOPMyW_lt5UnjezxQQRBFgZKOMooZHWnfa0cRDHradyIeA3ZZO46ZxI55sVa-UtxnsO4tclsyFmA1oRzJOr2DfBZOUFDbtTkEaIyVrwPBgLew6KAlsHUWy18CK7CGqjYKdyYYjm-mDaf335LNu-t0oa42ajb7yx72HpD7pSNLOwXyHpItkz4iO_3yV_1j8qunVhkdqiWStcxov6LhpZ3ZGA4zm1yuKDjMtDvo2J_AlMa0IJjIkfKefpvPMNVBwT-lWFcCmk3To_Xyp6HdKag68PXp2Xys8pXosKDFoViPSr_03ropffeEXNzIbeyS7XSemqeEMo19_KJEJInhAhZzncSXSnInioXf1hbZLQ89XBRNPcIAGyN6FnmDdxCidMM5a1U-UoBlsU9W2AF_FzAMatAirxszx0WX8P9NPGhMBPHVjeGX5XXXn5LHZUIUDKEFSiyyX0EhLJXMKqxFwiKygY56Jewd3hxJp5O8h7jrBuCYcIsc1ji6bv-9a_d_QXZAGMOzk8HpPrlXVNRgkuqAbGfLtXkGblsWPc8FhJLvNy2RfwBLXVPN | 
    
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Zb9NAEB6VVBwv3BWmBa3E_eAkjnd9wFNoCRUiUSSI1EpI1l5OIly7ShwqeIJ_wG_klzBrb6K6QgjxZmlX42NmZ75Zz34D8FhQ6ve4Dty0GyqXakx3uAqYG0ZpFc5ZLM2G_nAUHE7ouyN2tAWv1mdhlKGIL7hatmcmJz2bV97aftdlR5ws5h3zy77DDPEU5oEqvQTbAUMg3oLtyWjcP67ayXkUk6Kqkby9pp49nYcB9LyE6iQux2jEN075sr11A3ReLJm8uspP-dcznmXn4tHgBnxav0ldhvK5vSpFW367QPL4n696E65bnEr6tWHdgi2d34YrQ_sn_g78GPBlScZ8YXqxZGS47rJL-tm0WMzL2cmSIB4mB6P-r-8_X2OsVKTuIFGZwkvyocjMXgZBAEpM4Qi6Lkn2V4svmhzM0ZchmCfviymvZJFx3feGmIJT8nbwvJe_uAuTwZuP-4eubefgauoHpcsjjwehjgIa8zgWIuZhl2vuaylkFHhC4GAgo66gCj2F7ynlh4afUEkecU4jfwdaeZHre0B8aXj6RMrSVFOGwnrdNAp5SLtCsciTDuxYpSanNWlHEhviw8CBZ0bHiVm9qEfJ7SEEFGt4sJI-4lm0UXRzDjxtzJzWLOB_mrjXmIjLUzaGH1n1bh6lyrsYqzuA1sp1YHdtasnaApKIoftlmBM7EDasbyPJcIM3R_L5rOII7_ViBB7UgScbO_3b_e__47xduFYXzJg9qD1olYuVfoCorBQP7er7Dc14NUc | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Fast+Parallel+Molecular+Algorithms+for+DNA-Based+Computation%3A+Solving+the+Elliptic+Curve+Discrete+Logarithm+Problem+over+GF%282n%29&rft.jtitle=Journal+of+biomedicine+%26+biotechnology&rft.au=Li%2C+Kenli&rft.au=Zou%2C+Shuting&rft.au=Xv%2C+Jin&rft.date=2008-01-01&rft.pub=Hindawi+Publishing+Corporation&rft.issn=1110-7243&rft.eissn=1110-7251&rft.volume=2008&rft_id=info:doi/10.1155%2F2008%2F518093&rft_id=info%3Apmid%2F18431451&rft.externalDocID=PMC2292844 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2314-6133&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2314-6133&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2314-6133&client=summon |