Results 61 to 70 of about 2,163,207 (263)
Quantum attacks on Bitcoin, and how to protect against them [PDF]
The key cryptographic protocols used to secure the internet and financial transactions of today are all susceptible to attack by the development of a sufficiently large quantum computer.
Aggarwal, Divesh+4 more
core +3 more sources
A Case for Partitioned Bloom Filters [PDF]
In a partitioned Bloom Filter the $m$ bit vector is split into $k$ disjoint $m/k$ sized parts, one per hash function. Contrary to hardware designs, where they prevail, software implementations mostly adopt standard Bloom filters, considering partitioned filters slightly worse, due to the slightly larger false positive rate (FPR).
arxiv +1 more source
Attacks on double block length hash functions [PDF]
Attacks on double block length hash functions using a block cipher are considered in this paper. We present a general free-start attack, in which the attacker is free to choose the initial value, and a real attack on a large class of hash functions. Recent results on the complexities of attacks on double block hash functions are summarized.
Xuejia Lai, Lars R. Knudsen
openaire +1 more source
This research introduces the preparation and analysis of a newly heterogeneous catalyst developed silica nanospheres supporting a ferrocene‐containing ionic liquid (SiO2@Benzothiazole‐Cl@Fc) for the A3 coupling reaction. The catalyst facilitates the efficient synthesis of 1,3,5‐trisubstituted pyrazoles from aromatic hydrazides, aldehydes, and aromatic ...
Fadhil Faez Sead+8 more
wiley +1 more source
Trading Determinism for Time in Space Bounded Computations [PDF]
Savitch showed in $1970$ that nondeterministic logspace (NL) is contained in deterministic $\mathcal{O}(\log^2 n)$ space but his algorithm requires quasipolynomial time.
Kallampally, Vivek Anand T+1 more
core +2 more sources
Key Considerations on CITE‐Seq for Single‐Cell Multiomics
ABSTRACT CITE‐Seq (Cellular Indexing of Transcriptomes and Epitopes by Sequencing) is an advanced single‐cell sequencing method to profile both gene expression and protein abundance simultaneously in individual cells using single‐cell mRNA sequencing techniques alongside antibody‐derived tags (ADTs), for protein detection.
Hye‐Wong Song+3 more
wiley +1 more source
Rice is a critical crop for the delivery of calories and essential micronutrients to the human diet. Biofortification of rice with zinc (Zn) and iron (Fe) aims to combat the health issues associated with “hidden hunger”. Arbuscular mycorrhizal (AM) fungi have been explored for their potential to enhance Zn and Fe uptake in rice products.
Thi Diem Nguyen+7 more
wiley +1 more source
Leveraging Blockchain and Smart Contracts to Combat Greenwashing in Sustainable Development
ABSTRACT Blockchain technology, when combined with smart contracts, enables buyers to distinguish between greenwashed and genuinely eco‐friendly products. The presence of counterfeit items can severely impact supply chains by diminishing brand value, eroding consumer confidence, and undermining market trust.
Ragnhild Silkoset, Arne Nygaard
wiley +1 more source
A Lyra2 FPGA Core for Lyra2REv2-Based Cryptocurrencies
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms and it is used as a proof-of-work function in several cryptocurrencies that aim to be ASIC-resistant.
Balatsoukas-Stimming, Alexios+3 more
core +1 more source
Conductive Hydrogel‐Based Neural Interfaces: From Fabrication Methods, Properties, to Applications
This review summarizes the fabrication methods, properties, and applications of conductive hydrogels in neural interfaces. Finally, the prevailing challenges and outlines of future directions in the field of conductive hydrogels for neural interfaces are provided, emphasizing the need for interdisciplinary research to address issues such as long‐term ...
Xin‐Yu Xue+10 more
wiley +1 more source