Macromodelling for analog design and robustness boosting in bio-inspired computing models [PDF]
Setting specifications for the electronic implementation of biological neural-network-like vision systems on-chip is not straightforward, neither it is to simulate the resulting circuit.
Cuadri Carvajo, Jorge +3 more
core +1 more source
DESIGN OF TS GRADE GUIDING ANTI-COLLISION PAD BASED ON TOPOLOGY OPTIMIZATION (MT)
In order to solve the problem of single design method of the existing guided anti-collision pad, the guided anti-collision pad is designed to meet the requirements of the current regulations, and based on the collision-resistant topology optimization ...
SUN YuHao, LEI ZhengBao
doaj
Construction and Analysis of SHA-256 Compression Function Based on Chaos S-Box
To further improve the security of SHA-256, a compression function construction scheme based on chaotic S-box is proposed. Through the reasonable design of the iteration mode and using the nonlinearity, confusion, and anti-difference of chaotic S-box ...
Juan Wang, Ge Liu, Yongqi Chen, Shu Wang
doaj +1 more source
Sufficient Conditions for Collision-Resistant Hashing [PDF]
We present several new constructions of collision-resistant hash-functions (CRHFs) from general assumptions. We start with a simple construction of CRHF from any homomorphic encryption. Then, we strengthen this result by presenting constructions of CRHF from two other primitives that are implied by homomorphic-encryption: one-round private information ...
Rafail Ostrovsky +2 more
openaire +2 more sources
Comparing two cryptographic hash algorithms: SHA-512 and whirlpool- a case study on file integrity monitoring [PDF]
SHA-512 and Whirlpool are two distinct hashing algorithms in the cryptography domain. Although they are different, these methods share some characteristics; such as both of them produce secure digests of the same size.
Al-Shareefi Farah, Al-Barmani Zahraa
doaj +1 more source
Collision and Preimage Resistance of the Centera Content Address
Centera uses cryptographic hash functions as a means of addressing stored objects, thus creating a new class of data storage referred to as CAS (content addressed storage). Such hashing serves the useful function of providing a means of uniquely identifying data and providing a global handle to that data, referred to as the Content Address or CA ...
Robert Primmer, Carl D’Halluin
openalex +4 more sources
Earthquake Fingerprint of an Incipient Subduction of a Bathymetric High
The resistance of bathymetric highs to subduction results in large‐scale morphological distortions of the outer‐rise, trench, and fore‐arc regions. Once subducted, bathymetric highs induce frictional segmentation along the plate interface that may result
Luigi Passarelli +3 more
doaj +1 more source
Formal Computational Unlinkability Proofs of RFID Protocols
We set up a framework for the formal proofs of RFID protocols in the computational model. We rely on the so-called computationally complete symbolic attacker model. Our contributions are: i) To design (and prove sound) axioms reflecting the properties of
Comon, Hubert, Koutsos, Adrien
core +1 more source
Microwave-resonance-induced magnetooscillations and vanishing resistance states in multisubband two-dimensional electron systems [PDF]
The dc magnetoconductivity of the multisubband two-dimensional electron system formed on the liquid helium surface in the presence of resonant microwave irradiation is described, and a new mechanism of the negative linear response conductivity is studied
Dykman M. I. +7 more
core +2 more sources
Classically in combinatorics on words one studies unavoidable regularities that appear in sufficiently long strings of symbols over a fixed size alphabet.
A. Restivo +16 more
core +2 more sources

