Results 101 to 110 of about 10,638,853 (320)
An efficient and secure technique for image steganography using a hash function. [PDF]
Nezami ZI +5 more
europepmc +1 more source
Universal classes of hash functions (Extended Abstract) [PDF]
J. Lawrence Carter, Mark N. Wegman
openalex +1 more source
PPP-Completeness with Connections to Cryptography [PDF]
Polynomial Pigeonhole Principle (PPP) is an important subclass of TFNP with profound connections to the complexity of the fundamental cryptographic primitives: collision-resistant hash functions and one-way permutations.
Sotiraki, Katerina +2 more
core +1 more source
A Digital Phantom for MR Spectroscopy Data Simulation
ABSTRACT Purpose Simulated data is increasingly valued by researchers for validating MRS processing and analysis algorithms. However, there is no consensus on the optimal approaches for simulation models and parameters. This study introduces a novel MRS digital brain phantom framework, providing a comprehensive and modular foundation for MRS data ...
D. M. J. van de Sande +11 more
wiley +1 more source
Verification of Implementations of Cryptographic Hash Functions
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang +5 more
doaj +1 more source
Research progress in the application of single‐cell sequencing technology in rheumatic diseases
Application of single‐cell RNA sequencing (scRNA‐seq) technology in the study of the pathogenesis of rheumatic diseases. Tree of content illustration depicting the multi‐layered insights from scRNA‐seq in rheumatic diseases. The outer layer highlights key cell subsets identified by scRNA‐seq in rheumatoid arthritis, systemic lupus erythematosus ...
Xinzhe Feng +5 more
wiley +1 more source
The influence of random number generation in dissipative particle dynamics simulations using a cryptographic hash function. [PDF]
Okada K, Brumby PE, Yasuoka K.
europepmc +1 more source
Quantum search for scaled hash function preimages [PDF]
Sergi Ramos-Calderer +4 more
openalex +1 more source
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye +8 more
wiley +1 more source
Lightweight Verification and Fine-grained Access Control in Named Data Networking Based on Schnorr Signature and Hash Functions [PDF]
Shanglun Wu, Yu-Jie Yuan, Pushpendu Kar
openalex +1 more source

