The pterosaurs of the Cretaceous Kem Kem Group of Morocco
نویسندگان
چکیده
Abstract The pterosaur assemblage of the mid-Cretaceous Kem Group Morocco is reviewed. This analysis examines their taxonomy, palaeoecology and palaeobiology with comments on taphonomy. New material permits rediagnosis azhdarchoids Alanqa saharica Afrotapejara zouhrii . Several specimens are reported that do not fit within paradigms previously named taxa. They represent three distinct jaw morphotypes, but assigned to new taxa here. highly diverse, including four tooth-bearing Ornithocheiridae five additional morphotypes Azhdarchoidea. most diverse for any pterosaur-bearing fluvial deposit one assemblage. heavily biased in terms preservation an as yet unexplained high abundance fragments. We highlight importance fragmentary studies.
منابع مشابه
Correction: Dinosaur Footprints and Other Ichnofauna from the Cretaceous Kem Kem Beds of Morocco
We describe an extensive ichnofossil assemblage from the likely Cenomanian-age 'lower' and 'upper' units of the 'Kem Kem beds' in southeastern Morocco. In the lower unit, trace fossils include narrow vertical burrows in cross-bedded sandstones and borings in dinosaur bone, with the latter identified as the insect ichnotaxon Cubiculum ornatus. In the upper unit, several horizons preserve abundan...
متن کاملECIES-KEM vs. PSEC-KEM
The purpose of this paper is to discuss the similarities and differences between the PSEC-KEM and ECIES-KEM. The schemes are in very similar in some ways: both base their security on the Diffie-Hellman key-agreement protocol and both make heavy use of the random oracle model. However there are a few very important differences: PSEC-KEM is an authenticated KEM whilst ECIES-KEM is unauthenticated...
متن کاملSk-kem : an Identity-based Kem
1.1. Design Rationale. In this document we will describe an identity-based encryption scheme based on the work of Sakai and Kasahara [19], and which we call SK-KEM. The scheme operates on any elliptic curve group which has an efficiently computable bilinear pairing and does not require the use of super-singular curves. The resulting scheme is the most efficient and flexible provably-secure sche...
متن کاملKEM Combiners
Key-encapsulation mechanisms (KEMs) are a common stepping stone for constructing public-key encryption. Secure KEMs can be built from diverse assumptions, including ones related to integer factorization, discrete logarithms, error correcting codes, or lattices. In light of the recent NIST call for post-quantum secure PKE, the zoo of KEMs that are believed to be secure continues to grow. Yet, on...
متن کاملSimple SK - ID - KEM
In 2001, Boneh and Franklin presented the first efficient and security-proved identity-based encryption scheme using pairing on elliptic curve. In 2003 Sakai and Kasahara proposed another IBE scheme with pairing, which has the potential to improve performance. Later, Chen and Cheng proved the security of a variant of Sakai and Kasahara’s scheme. While, both the security-provable schemes employ ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Palaeontologische Zeitschrift
سال: 2023
ISSN: ['1867-6812', '0031-0220']
DOI: https://doi.org/10.1007/s12542-022-00642-6