Results 41 to 50 of about 20,415 (157)

Simple Tabulation, Fast Expanders, Double Tabulation, and High Independence

open access: yes, 2013
Simple tabulation dates back to Zobrist in 1970. Keys are viewed as c characters from some alphabet A. We initialize c tables h_0, ..., h_{c-1} mapping characters to random hash values.
Thorup, Mikkel
core   +1 more source

The Art of Crypto Currencies: A Comprehensive Analysis of Popular Crypto Currencies

open access: yes, 2016
Crypto Currencies have recently gained enormous popularity amongst the general public. With each passing day, more and more companies are radically accepting crypto cur-rencies in their payment systems, paving way for an economic revolution.
Farooq, Sameet, Hameed, Sufian
core   +1 more source

Improved Quantum Rebound Attacks on Double Block Length Hashing with Round-Reduced AES-256 and ARIA-256

open access: yesIACR Transactions on Symmetric Cryptology
At EUROCRYPT 2020, Hosoyamada and Sasaki proposed the first dedicated quantum collision attacks on hash functions. Their proposal presented a quantum adaptation of the rebound attack and revealed that differential trails, which have too low probability ...
Dongjae Lee, Seokhie Hong
doaj   +1 more source

Entanglement purification of unknown quantum states [PDF]

open access: yes, 2000
A concern has been expressed that ``the Jaynes principle can produce fake entanglement'' [R. Horodecki et al., Phys. Rev. A {\bf 59}, 1799 (1999)]. In this paper we discuss the general problem of distilling maximally entangled states from $N$ copies of a
A. K. Rajagopal   +29 more
core   +2 more sources

zk-REAL: A Zero-Knowledge-Based Protocol for Repeated Image Edit Authenticity Proof With Lattice Hashing

open access: yesIEEE Open Journal of the Computer Society
The rapid advancement of deepfake technology poses risks, including financial fraud and political misinformation, demanding robust methods for verifying image content authenticity.
Atsuki Koyama   +3 more
doaj   +1 more source

Distributed Ledger Technology for IoT: Parasite Chain Attacks

open access: yes, 2020
Directed Acyclic Graph (DAG) based Distributed Ledgers can be useful in a number of applications in the IoT domain. A distributed ledger should serve as an immutable and irreversible record of transactions, however, a DAG structure is a more complicated ...
Cullen, Andrew   +3 more
core   +1 more source

Attacks on double block length hash functions [PDF]

open access: yes, 1994
Attacks on double block length hash functions using a block cipher are considered in this paper. We present a general free-start attack, in which the attacker is free to choose the initial value, and a real attack on a large class of hash functions. Recent results on the complexities of attacks on double block hash functions are summarized.
Xuejia Lai, Lars R. Knudsen
openaire   +1 more source

Hashing for Similarity Search: A Survey [PDF]

open access: yes, 2014
Similarity search (nearest neighbor search) is a problem of pursuing the data items whose distances to a query item are the smallest from a large database.
Ji, Jianqiu   +3 more
core  

Toward a Secure Future: An Integrated Framework for PII Detection Using NLP and Visual Analysis

open access: yesIEEE Access
Safeguarding Personally Identifiable Information (PII) is critical to prevent data breaches and identity theft in the era of digital services. This paper presents a hybrid PII detection and secure verification system that integrates rule-based regular ...
S. Sheela   +3 more
doaj   +1 more source

Source-independent quantum random number generation

open access: yes, 2016
Quantum random number generators can provide genuine randomness by appealing to the fundamental principles of quantum mechanics. In general, a physical generator contains two parts---a randomness source and its readout.
Cao, Zhu   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy