Results 21 to 30 of about 215,056 (305)
Ship resistance in random ice field of small ice floes made of the substitute material
ObjectivesThis study focuses on the feasibility of a ship resistance model test in an ice field of small ice floes made of substitute material in order to reveal the resistance components and thereby provide technical support for the design of ice-going ...
Zhi ZONG, Zhaoyang CHEN
doaj +1 more source
On Quantum Collision Resistant Function [PDF]
In the classical hashing theory, collision is a coincidence of the values of a function with different arguments. This paper formulates a quantum analogue of the collision property. A variant of formalization of the concept of quantum function resistant to collisions was proposed.
openaire +2 more sources
Electron transport in Coulomb- and tunnel-coupled one-dimensional systems [PDF]
We develop a linear theory of electron transport for a system of two identical quantum wires in a wide range of the wire length L, unifying both the ballistic and diffusive transport regimes.
+16 more
core +3 more sources
In order to improve the anti-collision capacity of existing reinforced concrete (RC) columns under vehicle impact load, an experimental study on the anti-collision performance of RC columns strengthened with micro-expansive concrete filled steel tube was
Xin Liu +6 more
doaj +1 more source
Damage to bridge structures caused by vessel collision is a risk for bridges crossing water traffic routes. Therefore, safety around vessel collision of existing and planned bridges is one of the key technical problems that must be solved by engineering ...
Tao Fu, Yang Liu, Zhixin Zhu
doaj +1 more source
Sequential Hashing with Minimum Padding
This article presents a sequential domain extension scheme with minimum padding for hashing using a compression function. The proposed domain extension scheme is free from the length extension property.
Shoichi Hirose
doaj +1 more source
E-government Data Security Exchange Scheme Based on Proxy Re-signature [PDF]
Considering the security problem of e-government data exchange,a double trapdoor Hash function is proposed by using discrete logarithm assumption.Moreover,this function is proved to satisfy the properties,such as validity,trapdoor collision,collision ...
YANG Xiaodong,GAO Guojuan,ZHOU Qixu,LI Yanan,WANG Caifen
doaj +1 more source
New hash function based on C-MD structure and chaotic neural network
In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile ...
Liquan CHEN +4 more
doaj +3 more sources
Various techniques can be applied to center pillars to enhance collision characteristics during side crashes. For instance, patchwork (PW) can be welded to the center pillar to increase its stiffness, and partial softening (PS) can be applied to provide ...
Min Sik Lee +4 more
doaj +1 more source
Two-permutation-based hashing with binary mixing
We consider the generic design of compression functions based on two n-bit permutations and XOR-based mixing functions. It is known that any such function mapping n+α${n+\alpha }$ to α bits, with 1≤α≤n${1\le \alpha \le n}$, can achieve at most min{2α/2 ...
Luykx Atul +3 more
doaj +1 more source

