Results 91 to 100 of about 157,357 (284)

spongent: A Lightweight Hash Function [PDF]

open access: yes, 2011
This paper proposes spongent - a family of lightweight hash functions with hash sizes of 88 (for preimage resistance only), 128, 160, 224, and 256 bits based on a sponge construction instantiated with a present-type permutation, following the hermetic sponge strategy.
Andrey Bogdanov   +5 more
openaire   +1 more source

Term Spread Volatility as a Leading Indicator of Economic Activity

open access: yesJournal of Forecasting, EarlyView.
ABSTRACT In this paper, we examine the macroeconomic predictive power of the volatility of the US Treasury yield curve slope (term spread volatility). Our forecasting exercise shows that US term spread volatility has significant predictive power for US industrial production and employment growth.
Anastasios Megaritis   +3 more
wiley   +1 more source

Hash function requirements for Schnorr signatures

open access: yesJournal of Mathematical Cryptology, 2009
We provide two necessary conditions on hash functions for the Schnorr signature scheme to be secure, assuming compact group representations such as those which occur in elliptic curve groups. We also show, via an argument in the generic group model, that
Neven Gregory   +2 more
doaj   +1 more source

On the Design of Secure and Fast Double Block Length Hash Functions [PDF]

open access: yes, 2008
In this work the security of the rate-1 double block length hash functions, which based on a block cipher with a block length of n-bit and a key length of 2n-bit, is reconsidered.
Chen, Kefei, Gong, Z., Lai, X.J.
core   +3 more sources

More Efficient Privacy Amplification with Less Random Seeds via Dual Universal Hash Function

open access: yes, 2015
We explicitly construct random hash functions for privacy amplification (extractors) that require smaller random seed lengths than the previous literature, and still allow efficient implementations with complexity $O(n\log n)$ for input length $n$.
Hayashi, Masahito, Tsurumaru, Toyohiro
core   +1 more source

bacNeo: A Computational Toolkit for Identifying Bacteria‐Derived Neoantigens in Human Cancers

open access: yesiMetaMed, EarlyView.
We present bacterial neoantigen (bacNeo), a multi‐omics‐based computational software to classify bacterial components (BACC), type bacteria‐bound HLA alleles (BACH), and prioritize bacterial peptides as neoantigens (BACP). Bacterial neoantigen potential is quantified by score for peptide antigenicity recognition & kinetics (SPARK), enabling ...
Yunzhe Wang   +5 more
wiley   +1 more source

Development of a New Post-Quantum Digital Signature Algorithm: Syrga-1

open access: yesComputers
The distinguishing feature of hash-based algorithms is their high confidence in security. When designing electronic signature schemes, proofs of security reduction to certain properties of cryptographic hash functions are used.
Kunbolat Algazy   +3 more
doaj   +1 more source

XML data integrity based on concatenated hash function [PDF]

open access: yes, 2009
Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting.
Liu, B, Lu, J, Yip, YJ
core  

From Expectations to Experience: A Comparison of Program Director Priorities to Resident Case Logs

open access: yesThe Laryngoscope, EarlyView.
The present study identified 47 essential otolaryngology procedures via program director surveys and evaluated the extent of resident participation in these cases through ACGME case logs. Results revealed significant variability in surgical experience, with nearly half of these essential procedures being logged fewer than 10 times during residency ...
Taylor S. Erickson   +7 more
wiley   +1 more source

God's Presence in the Aisle: How God Salience Encourages Preference for Ultra‐Processed Foods

open access: yesPsychology &Marketing, EarlyView.
ABSTRACT God‐related cues are pervasive in consumers' daily lives, yet little research has examined how God salience shapes consumer food choices. Drawing on compensatory control theory and the literature on symbolic healing, we present findings from six studies, including a field experiment, demonstrating that high (vs.
Ali Gohary, Hean Tat Keh
wiley   +1 more source

Home - About - Disclaimer - Privacy