Results 71 to 80 of about 138,401 (282)

Developed Protocol for Key Exchange Based on Irreducible Polynomial [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2012
The Aim of this paper is to design a protocol for key exchanging to work on the available computers for different data security application. This paper proposed idea to modify the Diffie-Hellman key exchange by using truncated polynomial instead of ...
Abdul Monem S. Rahma   +2 more
doaj   +1 more source

Discrete Logarithms in Generalized Jacobians [PDF]

open access: yes, 2006
D\'ech\`ene has proposed generalized Jacobians as a source of groups for public-key cryptosystems based on the hardness of the Discrete Logarithm Problem (DLP).
Galbraith, S. D., Smith, B. A.
core   +4 more sources

Compliant Pneumatic Feet with Real‐Time Stiffness Adaptation for Humanoid Locomotion

open access: yesAdvanced Robotics Research, EarlyView.
A compliant pneumatic foot with real‐time variable stiffness enables humanoid robots to adapt to changing terrains. Using onboard vision and pressure control, the foot modulates stiffness within each gait cycle, reducing impact forces and improving balance. The design, cast in soft silicone with embedded air chambers and Kevlar wrapping, offers durable,
Irene Frizza   +3 more
wiley   +1 more source

Data‐Driven Bulldozer Blade Control for Autonomous Terrain Leveling

open access: yesAdvanced Robotics Research, EarlyView.
A simulation‐driven framework for autonomous bulldozer leveling is presented, combining high‐fidelity terramechanics simulation with a neural‐network‐based reduced‐order model. Gradient‐based optimization enables efficient, low‐level blade control that balances leveling quality and operation time.
Harry Zhang   +5 more
wiley   +1 more source

Digital signature scheme with doubled verification equation [PDF]

open access: yesComputer Science Journal of Moldova, 2020
A novel design of the signature schemes based on the hidden discrete logarithm problem is proposed, which is characterized in using special criterion oriented to providing security to potential quantum attacks.
D.N. Moldovyan   +2 more
doaj  

Heuristically Adaptive Diffusion‐Model Evolutionary Strategy

open access: yesAdvanced Science, EarlyView.
Building on the mathematical equivalence between diffusion models and evolutionary algorithms, researchers demonstrate unprecedented control over evolutionary optimization through conditional diffusion. By training diffusion models to associate parameters with specific traits, they can guide evolution toward solutions exhibiting desired behaviors ...
Benedikt Hartl   +3 more
wiley   +1 more source

Post-quantum public key-agreement scheme based on a new form of the hidden logarithm problem [PDF]

open access: yesComputer Science Journal of Moldova, 2019
A new form of the hidden discrete logarithm problem, proposed as primitive of the post-quantum public-key cryptoschemes, is defined over the 6-dimensional finite non-commutative associative algebra with a large set of the left-sided global units.
D.N. Moldovyan
doaj  

On the discrete logarithm problem for plane curves [PDF]

open access: yesJournal de théorie des nombres de Bordeaux, 2012
In this article the discrete logarithm problem in degree 0 class groups of curves over finite fields given by plane models is studied. It is proven that the discrete logarithm problem for non-hyperelliptic curves of genus 3 (given by plane models of degree 4) can be solved in an expected time of O ˜(q), where q is the cardinality of the ground field ...
openaire   +2 more sources

Collision bounds for the additive Pollard rho algorithm for solving discrete logarithms [PDF]

open access: yes, 2017
We prove collision bounds for the Pollard rho algorithm to solve the discrete logarithm problem in a general cyclic group $\mathbf {G}$ . Unlike the setting studied by Kim et al., we consider additive walks: the setting used in practice to solve the ...
Bos, Joppe W.   +2 more
core  

MGM as a Large‐Scale Pretrained Foundation Model for Microbiome Analyses in Diverse Contexts

open access: yesAdvanced Science, EarlyView.
We present the Microbial General Model (MGM), a transformer‐based foundation model pretrained on over 260,000 microbiome samples. MGM learns contextualized microbial representations via self‐supervised language modeling, enabling robust transfer learning, cross‐regional generalization, keystone taxa discovery, and prompt‐guided generation of realistic,
Haohong Zhang   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy