Results 211 to 220 of about 7,578 (241)
Some of the next articles are maybe not open access.

Evaluation of Associative Memory Using Parallel Chained Hashing

IEEE Transactions on Computers, 1984
Two parallel hashing algorithms based on open and chained hashing are discussed. The parallel chained hashing algorithm is efficient even in the environment where deletion and insertion frequently occur. The chained hashing memory with fewer memory banks has a performance equivalent to that of the open hashing memory.
null Hiraki, null Nishida, null Shimada
openaire   +1 more source

A Recursive Algorithm for General Hash Chain Traversal

2014 IEEE 17th International Conference on Computational Science and Engineering, 2014
A hash chain is a popular tool for improving the efficiency of several cryptographic applications. In spite of the computation efficiency of one-way function, the performance issue is a challenging research topic for chains with long length in resource-constrained environments.
Yi-Wen Peng, Wei-Mei Chen
openaire   +1 more source

Efficient Sealed-bid Auction using Hash Chain

2001
This paper proposes the first sealed-bid auction method which uses only hash function. We use a hash chain to commit a bidding price. By using the hash chain, we can drastically reduce the time needed for bidding and opening bids. If we use a practical hash function e.g.
Koutarou Suzuki   +2 more
openaire   +1 more source

Efficient Construction of Infinite Length Hash Chains with Perfect Forward Secrecy Using Two Independent Hash Functions

Proceedings of the 11th International Conference on Security and Cryptography, 2014
One-way hash chains have been used to secure many applications over the last three decades. To overcome the fixed length limitation of first generation designs, so-called infinite length hash chains have been introduced. Such designs typically employ methods of asynchronous cryptography or hash based message authentication codes.
openaire   +1 more source

Weighted One-Way Hash Chain and Its Applications

2000
An one-way hash chain generated by the iterative use of a one-way hash function on a secret value has recently been widely employed to develop many practical cryptographic solutions, especially electronic micropayment schemes. In this paper, we propose a new concept called a weighted one-way hash chain. We then proceed to use the new concept to improve
Yen Sung-Ming, Yuliang Zheng
openaire   +1 more source

Scalable Hash Chain Traversal for Mobile Devices

2005
Yaron Sella recently proposed a scalable version of Jakobsson's algorithm to traverse a hash chain of size n. Given the hash chain and a computation limit m (k=m+1 and (b = $\sqrt[k]{n}$)), Sella's algorithm traverses the hash chain using a total of kb memory. We improve the memory usage to k(b–1).
openaire   +1 more source

The assembly, regulation and function of the mitochondrial respiratory chain

Nature Reviews Molecular Cell Biology, 2021
Irene Vercellino, Leonid A Sazanov
exaly  

Status and perspectives of crystalline silicon photovoltaics in research and industry

Nature Reviews Materials, 2022
Christophe Ballif   +2 more
exaly  

Material properties and applications of mechanically interlocked polymers

Nature Reviews Materials, 2021
Laura F Hart   +2 more
exaly  

MicroRNAome genome: A treasure for cancer diagnosis and therapy

Ca-A Cancer Journal for Clinicians, 2014
Ioana Berindan-Neagoe   +2 more
exaly  

Home - About - Disclaimer - Privacy