Results 51 to 60 of about 19,467 (229)
RiffleScrambler - a memory-hard password storing function
We introduce RiffleScrambler: a new family of directed acyclic graphs and a corresponding data-independent memory hard function with password independent memory access. We prove its memory hardness in the random oracle model. RiffleScrambler is similar
D Aldous+6 more
core +1 more source
Simple Tabulation, Fast Expanders, Double Tabulation, and High Independence
Simple tabulation dates back to Zobrist in 1970. Keys are viewed as c characters from some alphabet A. We initialize c tables h_0, ..., h_{c-1} mapping characters to random hash values.
Thorup, Mikkel
core +1 more source
Illuminating Advances in Materials: Optical Physical Unclonable Functions for Security Applications
This review highlights Optical Physical Unclonable Functions (OPUFs) as secure, light‐driven authentication tools. It surveys material platforms including optical fibers, low‐dimensional materials, luminophores, plasmonic nanoparticles and rare earth OPUFs systems.
Syeda Ramsha Ali+4 more
wiley +1 more source
A Lyra2 FPGA Core for Lyra2REv2-Based Cryptocurrencies
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms and it is used as a proof-of-work function in several cryptocurrencies that aim to be ASIC-resistant.
Balatsoukas-Stimming, Alexios+3 more
core +1 more source
Entanglement purification of unknown quantum states [PDF]
A concern has been expressed that ``the Jaynes principle can produce fake entanglement'' [R. Horodecki et al., Phys. Rev. A {\bf 59}, 1799 (1999)]. In this paper we discuss the general problem of distilling maximally entangled states from $N$ copies of a
A. K. Rajagopal+29 more
core +2 more sources
ABSTRACT This study explores the practical application of blockchain technology in accounting through a single case study of TLAB SCF, an Italian financial consulting firm actively involved in national and European digital innovation initiatives. The research adopts the technology acceptance model to investigate how perceived usefulness and perceived ...
Paolo Pietro Biancone+3 more
wiley +1 more source
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil+2 more
wiley +1 more source
Trends and Insights in Arab Audit Research: A Bibliometric Exploration
ABSTRACT This study employs bibliometric analysis to investigate audit research trends across five Arab countries—Jordan, Saudi Arabia, Egypt, Tunisia and the United Arab Emirates—each reflecting distinct sociopolitical, economic and legal contexts.
Zouhour Ben Hamadi, Peter Ghattas
wiley +1 more source
A systematic approach for identifying drivers of critical safety and establishing their hierarchy
Abstract Learning from incidents is a crucial step in preventing and mitigating adverse events. Incident databases offer valuable insights for safety management improvements by cause and contributing factors. However, extracting meaningful information from incident investigation reports poses a significant challenge. This study introduces a data‐driven
Mohammad Zaid Kamil+2 more
wiley +1 more source
Hashing based Answer Selection
Answer selection is an important subtask of question answering (QA), where deep models usually achieve better performance. Most deep models adopt question-answer interaction mechanisms, such as attention, to get vector representations for answers.
Li, Wu-Jun, Xu, Dong
core +1 more source