Results 71 to 80 of about 6,906 (225)
Generalized Hash Chain Traversal with Selective Output
A hash chain H for a one-way hash function h(·) is a sequence of hash values , where v0 is a public value, vn a secret value, and vi =h(vi+1). A hash chain traversal algorithm T computes and outputs the hash chain H, returning vi in time period (called round) i for 1 ≤ i ≤ n.
Yum, DH, Seo, JW, Cho, K, Lee, PJ
openaire +4 more sources
Exploring collagen fibrillogenesis at the nanoscale: Tip‐enhanced Raman imaging of protofibrils
Abstract Collagen, a key structural component of the extracellular matrix, assembles through a hierarchical process of fibrillogenesis. Despite extensive studies on mature collagen fibrils, intermediates such as protofibrils remain underexplored, particularly at the nanoscale.
Maria A. Paularie+5 more
wiley +1 more source
Intentionality and Attentionality Dynamics in an Institutional Change Process
Abstract In this article, we explore how actors' intentionality emerges, develops, and co‐evolves with institutional change. Although intentions are essential in shaping institutional change agents' motivations and actions, our understanding of their dynamics is limited and biased by the assumption that intentions are usually identifiable prior to ...
Sofiane Baba, Taïeb Hafsi, Omar Hemissi
wiley +1 more source
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions
We provide a survey about generic attacks on cryptographic hash constructions including hash-based message authentication codes and hash combiners. We look into attacks involving iteratively evaluating identical mappings many times.
Zhenzhen Bao, Jian Guo, Lei Wang
doaj +1 more source
ABSTRACT Within discussions of deliberative democracy, the role of facilitator is ever‐present: they gather participants, introduce expert information, correct for discursive prejudices, and more. Few recognize, however, that facilitators therefore exercise substantive, normative control over the process, thereby constituting a threat to the legitimacy
Emerson R. Bodde
wiley +1 more source
Efficient incremental hash chain with probabilistic filter-based method to update blockchain light nodes [PDF]
Maher Maalla, Sergey Bezzateev
openalex +1 more source
Abstract Introduction Oyster reef restoration has expanded in the Gulf of Mexico, yet many large‐scale projects fail to sustain ecological or physical outcomes. A key challenge is maintaining vertical relief in dynamic estuarine settings, where low elevation and cultch degradation limit recruitment and reef persistence.
Joseph Aufmuth+4 more
wiley +1 more source
Multi-Dimensional Hash Chains and Application to Micropayment Schemes [PDF]
One-way hash chains have been used in many micropayment schemes due to their simplicity and efficiency. In this paper we introduce the notion of multi-dimensional hash chains, which is a new generalization of traditional one-way hash chains. We show that this construction has storage-computational complexity of O(logN) per chain element, which is ...
openaire +3 more sources
ABSTRACT We perform bibliometric analysis on documents for 255 Regulatory Impact Analyzes (RIAs) prepared by the US Environmental Protection Agency (EPA) from 1980 through 2024. Using a series of automated information extraction methods, we extract references from these documents and match them to bibliographic records.
Tyler A. Scott, Sojeong Kim, Liza Wood
wiley +1 more source
The application of hash chains and hash structures to cryptography
In this thesis we study how hash chains and other hash structures can be used in various cryptographic applications. In particular we focus on the applications of entity authentication, signatures and key establishment. We study recursive application of hash functions to create hash chains, hash trees and other hash structures. We collate all these to
openaire +3 more sources