Results 1 to 10 of about 250,620 (292)

Construction and Analysis of SHA-256 Compression Function Based on Chaos S-Box [PDF]

open access: goldIEEE Access, 2021
To further improve the security of SHA-256, a compression function construction scheme based on chaotic S-box is proposed. Through the reasonable design of the iteration mode and using the nonlinearity, confusion, and anti-difference of chaotic S-box ...
Juan Wang, Ge Liu, Yongqi Chen, Shu Wang
doaj   +2 more sources

Algebraic Fault Analysis of SHA-256 Compression Function and Its Application [PDF]

open access: goldInformation, 2021
Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on.
Kazuki Nakamura   +2 more
doaj   +2 more sources

Theory compression with elliptic functions [PDF]

open access: bronzeSymposium - International Astronomical Union, 1996
Introduction of Jacobi elliptic functions in planetary, satellite and cometary problems of celestial mechanics is a transformation of variables to present the analytical theories of motion in the more compact form as compared with the traditional series in multiples of mean longitudes or mean anomalies.
V. A. Brumberg
openalex   +2 more sources

Network Functional Compression [PDF]

open access: yesIEEE Transactions on Information Theory, 2021
In this paper, we consider different aspects of the network functional compression problem where computation of a function (or, some functions) of sources located at certain nodes in a network is desired at receiver(s). The rate region of this problem has been considered in the literature under certain restrictive assumptions, particularly in terms of ...
Soheil Feizi, Muriel Mérd
openaire   +3 more sources

Electrophysiological, biomechanical, and finite element analysis study of sacral nerve injury caused by sacral fracture

open access: yesFrontiers in Bioengineering and Biotechnology, 2022
Background: We aimed to study the mechanism of sacral nerve injury caused by sacral fractures and the relationship between nerve decompression and nerve function.Methods: First, we observed the anatomical features of lumbosacral nerve root region in ...
Zisheng Xu   +11 more
doaj   +1 more source

Image Compression Using Fractal Functions [PDF]

open access: yesFractal and Fractional, 2021
The rapid growth of geographic information technologies in the field of processing and analysis of spatial data has led to a significant increase in the role of geographic information systems in various fields of human activity. However, solving complex problems requires the use of large amounts of spatial data, efficient storage of data on on-board ...
Olga Svynchuk   +4 more
openaire   +2 more sources

Activation Function and Compression Model for Lightweight Convolutional Network [PDF]

open access: yesJisuanji gongcheng, 2022
The abundance of computing and storage resources required in model training to relieve the parameter expansion of a deep convolution neural network, limiting a network's application on edge terminals.Based on the design idea of the depthwise separable ...
XU Zengmin, CHEN Kai, GUO Weiwei, ZHAO Ruwen, JIANG Zhansi
doaj   +1 more source

Compression Image by Using Iterated Function Systems [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2012
This research was in the compression digital images using the iterative function and applied to grayscale images, color images and then re-pressed image decoding.
Basil Al-khayat, Mahasin Younis
doaj   +1 more source

Compressed Static Functions with Applications [PDF]

open access: yesProceedings of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, 2013
Given a set of integer keys from a bounded universe along with associated data, the dictionary problem asks to answer two queries: membership and retrieval. Membership has to tell whether a given element is in the dictionary or not; Retrieval has to return the data associated with the searched key.
Belazzougui Djamal, VENTURINI, ROSSANO
openaire   +4 more sources

Enhancing the secrecy of a cryptographic key generated using synchronized artificial neural networks1

open access: yesInformatika, 2020
The main options for the formation of a shared secret using synchronized artificial neural networks and possible patterns of behavior of a cryptanalyst are considered.
M. L. Radziukevich, V. F. Golikov
doaj   +1 more source

Home - About - Disclaimer - Privacy