Results 41 to 50 of about 215,056 (305)
Strong accumulators from collision-resistant hashing
Accumulator schemes were introduced in order to represent a large set of values as one short value called the accumulator. These schemes allow one to generate membership proofs, that is, short witnesses that a certain value belongs to the set. In universal accumulator schemes, efficient proofs of non-membership can also be created.
Camacho, Philippe +3 more
openaire +5 more sources
Comparing two cryptographic hash algorithms: SHA-512 and whirlpool- a case study on file integrity monitoring [PDF]
SHA-512 and Whirlpool are two distinct hashing algorithms in the cryptography domain. Although they are different, these methods share some characteristics; such as both of them produce secure digests of the same size.
Al-Shareefi Farah, Al-Barmani Zahraa
doaj +1 more source
The fine structure of microwave-induced magneto-oscillations in photoconductivity of the two-dimensional electron system formed on a liquid-helium surface [PDF]
The influence of the inelastic nature of electron scattering by surface excitations of liquid helium (ripplons) on the shape of magnetoconductivity oscillations induced by resonance microwave (MW) excitation is theoretically studied.
Dykman M. I. +10 more
core +2 more sources
Formal Computational Unlinkability Proofs of RFID Protocols
We set up a framework for the formal proofs of RFID protocols in the computational model. We rely on the so-called computationally complete symbolic attacker model. Our contributions are: i) To design (and prove sound) axioms reflecting the properties of
Comon, Hubert, Koutsos, Adrien
core +1 more source
Regrasp Planning using 10,000s of Grasps
This paper develops intelligent algorithms for robots to reorient objects. Given the initial and goal poses of an object, the proposed algorithms plan a sequence of robot poses and grasp configurations that reorient the object from its initial pose to ...
Harada, Kensuke, Wan, Weiwei
core +1 more source
Construction and Analysis of SHA-256 Compression Function Based on Chaos S-Box
To further improve the security of SHA-256, a compression function construction scheme based on chaotic S-box is proposed. Through the reasonable design of the iteration mode and using the nonlinearity, confusion, and anti-difference of chaotic S-box ...
Juan Wang, Ge Liu, Yongqi Chen, Shu Wang
doaj +1 more source
Coulomb drag between ballistic quantum wires
We develop a kinetic equation description of Coulomb drag between ballistic one-dimensional electron systems, which enables us to demonstrate that equilibration processes between right- and left-moving electrons are crucially important for establishing ...
A. I. Baz' +16 more
core +1 more source
Earthquake Fingerprint of an Incipient Subduction of a Bathymetric High
The resistance of bathymetric highs to subduction results in large‐scale morphological distortions of the outer‐rise, trench, and fore‐arc regions. Once subducted, bathymetric highs induce frictional segmentation along the plate interface that may result
Luigi Passarelli +3 more
doaj +1 more source
Classically in combinatorics on words one studies unavoidable regularities that appear in sufficiently long strings of symbols over a fixed size alphabet.
A. Restivo +16 more
core +2 more sources
Rotamak confinement-power-current relationships and r.f. loading resistance [PDF]
The relationships between input power, driven current, energy confinement, temperature and density are examined in detail for existing rotamak experiments. Additionally, the loading resistance presented to the r.f.
Bellan, P. M.
core +1 more source

