Results 41 to 50 of about 279,849 (339)
Quantum Lightning Never Strikes the Same State Twice [PDF]
Public key quantum money can be seen as a version of the quantum no-cloning theorem that holds even when the quantum states can be verified by the adversary.
B Barak+17 more
core +2 more sources
Two-permutation-based hashing with binary mixing
We consider the generic design of compression functions based on two n-bit permutations and XOR-based mixing functions. It is known that any such function mapping n+α${n+\alpha }$ to α bits, with 1≤α≤n${1\le \alpha \le n}$, can achieve at most min{2α/2 ...
Luykx Atul+3 more
doaj +1 more source
The collision between the pipe legs of jacket platforms and bypassing ships is of great concern for the safety assessment of platforms. Honeycomb structures have been widely used owing to their unique deformation and mechanical properties under dynamic ...
Hong Lin+7 more
doaj +1 more source
Algebraic Collision Attacks on Keccak
In this paper, we analyze the collision resistance of the two smallest versions of Keccak which have a width of 200 and 400 bits respectively. We show that algebraic and linearization techniques can serve collision cryptanalysis by using some interesting
Rachelle Heim Boissier+2 more
doaj +1 more source
Rotamak confinement-power-current relationships and r.f. loading resistance [PDF]
The relationships between input power, driven current, energy confinement, temperature and density are examined in detail for existing rotamak experiments. Additionally, the loading resistance presented to the r.f.
Bellan, P. M.
core +1 more source
The main objective of this paper is to review and examine the effects of the selected collision parameter values on the characteristics of collision energy in several ship collision scenarios.
Aditya Rio Prabowo+3 more
doaj +1 more source
HMNT: Hash Function Based on New Mersenne Number Transform
In the field of information security, hash functions are considered important as they are used to ensure message integrity and authentication. Despite various available methods to design hash functions, the methods have been proven to time inefficient ...
Ali Maetouq, Salwani Mohd Daud
doaj +1 more source
Collision-resistant hash function based on composition of functions [PDF]
A cryptographic hash function is a deterministic procedure that compresses an arbitrary block of numerical data and returns a fixed-size bit string. There exists many hash functions: MD5, HAVAL, SHA, ... It was reported that these hash functions are no longer secure. Our work is focused on the construction of a new hash function based on composition of
Ndoundam, René, Karnel Sadie, Juvet
openaire +6 more sources
Ship collision appears as the most threatening loading accounting for structural casualties and numbers of casualties after impact on the target ship.
Prabowo Aditya Rio, Sohn Jung Min
doaj +1 more source
Design of a wideband and tunable radar absorber
To effectively address the challenges posed by intricate and dynamic electromagnetic environments, we propose a wideband and tunable radar absorber in this paper.
Xin Gao+4 more
doaj +1 more source