Results 41 to 50 of about 215,056 (305)

Strong accumulators from collision-resistant hashing

open access: yesInternational Journal of Information Security, 2008
Accumulator schemes were introduced in order to represent a large set of values as one short value called the accumulator. These schemes allow one to generate membership proofs, that is, short witnesses that a certain value belongs to the set. In universal accumulator schemes, efficient proofs of non-membership can also be created.
Camacho, Philippe   +3 more
openaire   +5 more sources

Comparing two cryptographic hash algorithms: SHA-512 and whirlpool- a case study on file integrity monitoring [PDF]

open access: yesBIO Web of Conferences
SHA-512 and Whirlpool are two distinct hashing algorithms in the cryptography domain. Although they are different, these methods share some characteristics; such as both of them produce secure digests of the same size.
Al-Shareefi Farah, Al-Barmani Zahraa
doaj   +1 more source

The fine structure of microwave-induced magneto-oscillations in photoconductivity of the two-dimensional electron system formed on a liquid-helium surface [PDF]

open access: yes, 2013
The influence of the inelastic nature of electron scattering by surface excitations of liquid helium (ripplons) on the shape of magnetoconductivity oscillations induced by resonance microwave (MW) excitation is theoretically studied.
Dykman M. I.   +10 more
core   +2 more sources

Formal Computational Unlinkability Proofs of RFID Protocols

open access: yes, 2017
We set up a framework for the formal proofs of RFID protocols in the computational model. We rely on the so-called computationally complete symbolic attacker model. Our contributions are: i) To design (and prove sound) axioms reflecting the properties of
Comon, Hubert, Koutsos, Adrien
core   +1 more source

Regrasp Planning using 10,000s of Grasps

open access: yes, 2017
This paper develops intelligent algorithms for robots to reorient objects. Given the initial and goal poses of an object, the proposed algorithms plan a sequence of robot poses and grasp configurations that reorient the object from its initial pose to ...
Harada, Kensuke, Wan, Weiwei
core   +1 more source

Construction and Analysis of SHA-256 Compression Function Based on Chaos S-Box

open access: yesIEEE Access, 2021
To further improve the security of SHA-256, a compression function construction scheme based on chaotic S-box is proposed. Through the reasonable design of the iteration mode and using the nonlinearity, confusion, and anti-difference of chaotic S-box ...
Juan Wang, Ge Liu, Yongqi Chen, Shu Wang
doaj   +1 more source

Coulomb drag between ballistic quantum wires

open access: yes, 2012
We develop a kinetic equation description of Coulomb drag between ballistic one-dimensional electron systems, which enables us to demonstrate that equilibration processes between right- and left-moving electrons are crucially important for establishing ...
A. I. Baz'   +16 more
core   +1 more source

Earthquake Fingerprint of an Incipient Subduction of a Bathymetric High

open access: yesGeophysical Research Letters, 2022
The resistance of bathymetric highs to subduction results in large‐scale morphological distortions of the outer‐rise, trench, and fore‐arc regions. Once subducted, bathymetric highs induce frictional segmentation along the plate interface that may result
Luigi Passarelli   +3 more
doaj   +1 more source

Combinatorics on words in information security: Unavoidable regularities in the construction of multicollision attacks on iterated hash functions

open access: yes, 2011
Classically in combinatorics on words one studies unavoidable regularities that appear in sufficiently long strings of symbols over a fixed size alphabet.
A. Restivo   +16 more
core   +2 more sources

Rotamak confinement-power-current relationships and r.f. loading resistance [PDF]

open access: yes, 1989
The relationships between input power, driven current, energy confinement, temperature and density are examined in detail for existing rotamak experiments. Additionally, the loading resistance presented to the r.f.
Bellan, P. M.
core   +1 more source

Home - About - Disclaimer - Privacy