Results 31 to 40 of about 20,342 (243)
Quantum Collision Resistance of Double-Block-Length Hashing
Shoichi Hirose, Hidenori KUWAKADO
openalex +3 more sources
BackgroundOver the past decade, the emergence of several large federated clinical data networks has enabled researchers to access data on millions of patients at dozens of health care organizations.
Yu, Yun William, Weber, Griffin M
doaj +1 more source
Approximately Minwise Independence with Twisted Tabulation [PDF]
A random hash function $h$ is $\varepsilon$-minwise if for any set $S$, $|S|=n$, and element $x\in S$, $\Pr[h(x)=\min h(S)]=(1\pm\varepsilon)/n$. Minwise hash functions with low bias $\varepsilon$ have widespread applications within similarity estimation.
A. Broder +6 more
core +1 more source
Optimized Entanglement Purification [PDF]
We investigate novel protocols for entanglement purification of qubit Bell pairs. Employing genetic algorithms for the design of the purification circuit, we obtain shorter circuits achieving higher success rates and better final fidelities than what is ...
Albert, Victor V. +2 more
core +2 more sources
Chameleon: a Blind Double Trapdoor Hash Function for Securing AMI Data Aggregation [PDF]
Data aggregation is an integral part of Advanced Metering Infrastructure (AMI) deployment that is implemented by the concentrator. Data aggregation reduces the number of transmissions, thereby reducing communication costs and increasing the bandwidth ...
Keoh, Sye Loong +5 more
core +1 more source
A Standalone FPGA-based Miner for Lyra2REv2 Cryptocurrencies
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms, and it is used as a proof-of-work function in several cryptocurrencies.
Balatsoukas-Stimming, Alexios +4 more
core +2 more sources
The Stability and the Security of the Tangle [PDF]
In this paper we study the stability and the security of the distributed data structure at the base of the IOTA protocol, called the Tangle. The contribution of this paper is twofold.
Bramas, Quentin
core +2 more sources
Quantum attacks on Bitcoin, and how to protect against them [PDF]
The key cryptographic protocols used to secure the internet and financial transactions of today are all susceptible to attack by the development of a sufficiently large quantum computer.
Aggarwal, Divesh +4 more
core +3 more sources
Palm-Print Pattern Matching Based on Features Using Rabin-Karp for Person Identification
Palm-print based individual identification is regarded as an effectual method for identifying persons with high confidence. Palm-print with larger inner surface of hand contains many features such as principle lines, ridges, minutiae points, singular ...
S. Kanchana, G. Balakrishnan
doaj +1 more source
Scalable distributed event detection for Twitter [PDF]
Social media streams, such as Twitter, have shown themselves to be useful sources of real-time information about what is happening in the world.
Macdonald, Craig +4 more
core +2 more sources

