Results 121 to 130 of about 10,475,631 (365)
Анализ семейств хэш-функций, определяемых автоматами над конечным кольцом [PDF]
Досліджено загальні властивості сімейств хеш-функцій, визначених сильнозв язаними автоматами без вихідної функції над скінченним кільцем. Знайдено ймовірність випадкового вибору послідовності, для якої хеш-функція приймає задане значення, а також ...
Скобелев, В.В.
core
High‐Throughput Mechanical Characterization of Single Microgel Particles by Fluidic Force Microscopy
The combination of atomic force microscopy and nanofluidics (FluidFM) allows for a new approach for the mechanical characterization of particulate soft matter in the micrometer regime by inverted nanoindentation. Based on the simplified double contact model, the Young's moduli of microgel particles can be determined much faster than by classical ...
Agnes Specht+8 more
wiley +1 more source
An undergraduate project to compute minimal perfect hashing functions [PDF]
John A. Trono
openalex +1 more source
A Pt‐Fe‐Sn alloy catalyst supported on activated carbon is synthesized via laser synthesis in liquid, introducing lattice distortions that enhance active site exposure and toluene desorption. The catalyst achieves a hydrogen evolution rate of 2625 mmol gPt⁻¹ min⁻¹ with 99.96% selectivity and excellent stability, offering a promising strategy for ...
Zheng Wang+5 more
wiley +1 more source
ABSTRACT Introduction The popularization of blockchain‐based applications made evident a critical challenge, namely the inherent isolation of these decentralized systems, akin to the disconnected and technologically diverse local area networks of the 1970s. This lack of interoperability limits the potential for widespread adoption and innovation in the
Christian Delgado‐von‐Eitzen+3 more
wiley +1 more source
Using Hash Functions as a Hedge against Chosen Ciphertext Attack [PDF]
Victor Shoup
openalex +1 more source
A perceptual hash function to store and retrieve large scale DNA sequences
This paper proposes a novel approach for storing and retrieving massive DNA sequences.. The method is based on a perceptual hash function, commonly used to determine the similarity between digital images, that we adapted for DNA sequences.
Bailly, Xavier+3 more
core
Determination of the Optimal Window Size for the Spatial XOR Filter
ABSTRACT Introduction An XOR filter is a probabilistic data structure representing a set of keys for membership queries. Given a set X⊂𝒰 of n$$ n $$ keys, and hash functions h1,…,hk:𝒰→{1,…,m}, the filter relies on filling in an array H[1,…,m]$$ H\left[1,\dots, m\right] $$ such that, for all x∈X$$ x\in X $$, h1(x)⊕⋯⊕hk(x)$$ {h}_1(x)\oplus \cdots \oplus {
Paulo Diogo Rodrigues Leão+2 more
wiley +1 more source
Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps
A novel coupled tent maps-based spatiotemporal chaotic cryptographic Hash function was proposed.Compared with the discrete tent map,the coupled discrete tent spatiotemporal chaotic maps have longer computer-realization-period,nearly uniform distribution ...
LIU Jian-dong, FU Xiu-li
doaj +2 more sources
A Composition Theorem for Universal One-Way Hash Functions [PDF]
Victor Shoup
openalex +1 more source