Results 101 to 110 of about 10,475,631 (365)
In the control of network terminal power, due to the overall low analysis of network state, the adaptive regulation ability of communication network terminal power is poor.Therefore, the power line carrier communication network terminal power control ...
Hong XUE+4 more
doaj +2 more sources
Development of a New Post-Quantum Digital Signature Algorithm: Syrga-1
The distinguishing feature of hash-based algorithms is their high confidence in security. When designing electronic signature schemes, proofs of security reduction to certain properties of cryptographic hash functions are used.
Kunbolat Algazy+3 more
doaj +1 more source
Hash function requirements for Schnorr signatures
We provide two necessary conditions on hash functions for the Schnorr signature scheme to be secure, assuming compact group representations such as those which occur in elliptic curve groups. We also show, via an argument in the generic group model, that
Neven Gregory+2 more
doaj +1 more source
Verifiable Random Functions (VRFs) [PDF]
A Verifiable Random Function (VRF) is the public-key version of a keyed cryptographic hash. Only the holder of the private key can compute the hash, but anyone with public key can verify the correctness of the hash.
Goldberg, Sharon+3 more
core
A novel parallel hash function based on 3D chaotic map
As the core of cryptography, hash function is one of the basic techniques for information security. During the last few years, considerable effort has been devoted to research on chaos-based hash functions.
A. Akhavan, A. Samsudin, A. Akhshani
semanticscholar +1 more source
ABSTRACT The Split Delivery Vehicle Routing Problem with Two‐dimensional Loading Constraints (2L‐SDVRP) integrates vehicle routing, split delivery, and two‐dimensional packing constraints. In the 2L‐SDVRP, customers can be served by multiple vehicles, and their demands consist of different two‐dimensional rectangular items that must be packed in the ...
Kamyla Maria Ferreira+4 more
wiley +1 more source
GPERF : a perfect hash function generator [PDF]
gperf is a widely available perfect hash function generator written in C++. It automates a common system software operation: keyword recognition. gperf translates an n element user-specified keyword list keyfile into source code containing a k element ...
Schmidt, Douglas C., Suda, Tatsuya
core
Quantum Security of Hash Functions and Property-Preservation of Iterated Hashing [PDF]
This work contains two major parts: comprehensively studying the security notions of cryptographic hash functions against quantum attacks and the relationships between them; and revisiting whether Merkle-Damgard and related iterated hash constructions preserve the security properties of the compression function in the quantum setting.
Ben Hamlin, Fang Song
openaire +3 more sources
Key Considerations on CITE‐Seq for Single‐Cell Multiomics
ABSTRACT CITE‐Seq (Cellular Indexing of Transcriptomes and Epitopes by Sequencing) is an advanced single‐cell sequencing method to profile both gene expression and protein abundance simultaneously in individual cells using single‐cell mRNA sequencing techniques alongside antibody‐derived tags (ADTs), for protein detection.
Hye‐Wong Song+3 more
wiley +1 more source
Enhanced payload volume in the least significant bits image steganography using hash function. [PDF]
Ghadi YY+5 more
europepmc +1 more source