Results 51 to 60 of about 154,141 (333)

One-way hash function with chaotic dynamic parameters

open access: yesTongxin xuebao, 2008
A novel keyed one-way hash function based on chaotic dynamic parameters was presented which combines the advantage of both chaotic system and conventional one-way hash function.In the proposed approach the fixed parameters of conventional hash function ...
GUO Wei1   +3 more
doaj   +2 more sources

Leftover Hashing Against Quantum Side Information

open access: yes, 2010
The Leftover Hash Lemma states that the output of a two-universal hash function applied to an input with sufficiently high entropy is almost uniformly random.
Renner, Renato   +3 more
core   +1 more source

Hemp Proteins Conjugated with Green Tea Polyphenol Extract Form De Novo Plant‐Sourced Emulsifiers Suitable for Nanodelivery Systems Bearing Lipophilic Psychopharmaceuticals

open access: yesAdvanced Therapeutics, EarlyView.
Green tea polyphenols, conjugated either covalently or non‐covalently to hemp protein, comprise an excellent stabilizing matrix for oxidatively‐sensitive small molecules. These nanoemulsions are highly stable to a variety of chemical and physical stressors, protecting the small molecule while allowing for easy uptake across cell membranes and rapid ...
William Charles Hosie   +9 more
wiley   +1 more source

The Usefulness of Multilevel Hash Tables with Multiple Hash Functions in Large Databases [PDF]

open access: yes, 2009
In this work, attempt is made to select three good hash functions which uniformly distribute hash values that permute their internal states and allow the input bits to generate different output bits.
Akinwale, A. T., Ibharalu, F. T.
core   +1 more source

Key recycling in authentication

open access: yes, 2014
In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad.
Portmann, Christopher
core   +1 more source

Advanced Microfluidics for Single Cell‐Based Cancer Research

open access: yesAdvanced Science, EarlyView.
Cutting‐edge microfluidic platforms are transforming single‐cell cancer research. This review highlights advanced technologies, from droplet microfluidics to tumour‐chips, that enable functional and spatial single‐cell analyses. By integrating biosensing, immune components, and patient‐derived materials, these systems offer new insights into tumour ...
Adriana Carneiro   +10 more
wiley   +1 more source

Multi‐Level Optical Physical Unclonable Function Based on Random Surface Scattering for Hierarchical Cryptographic Protocols

open access: yesAdvanced Science, EarlyView.
This study proposed physical unclonable function based multi‐level key space generation scheme. By exploiting speckle characteristic, a size‐controllable structure is achieved and that is suitable foundation for multiple key extraction. The flexible key space supports various specifications for advanced applications, such as hierarchical authentication
Jeong Jin Kim, Min Seong Kim, Gil Ju Lee
wiley   +1 more source

Hashing with binary autoencoders

open access: yes, 2015
An attractive approach for fast search in image databases is binary hashing, where each high-dimensional, real-valued image is mapped onto a low-dimensional, binary vector and the search is done in this binary space.
Carreira-Perpiñán, Miguel Á.   +1 more
core   +1 more source

Leveraging 3D Molecular Spatial Visual Information and Multi‐Perspective Representations for Drug Discovery

open access: yesAdvanced Science, EarlyView.
A deep learning framework called MolVisGNN is proposed to fuse 3D molecular visual information of drugs with multi‐source features, which proves the importance of 3D molecular visual information of drugs and the advancedness of this model in the field of drug discovery, and provides a reference for how to more comprehensively express small molecule ...
Zimai Zhang   +9 more
wiley   +1 more source

Keyed Hash Function Using Hyper Chaotic System With Time-Varying Parameters Perturbation

open access: yesIEEE Access, 2019
Secure hash function plays an important role in cryptography. This paper constructs a hash algorithm using the hyperchaotic Lorenz system, which serves as a sponge function to absorb input message via multiple parameters time-varying perturbation. First,
Hongjun Liu, Abdurahman Kadir, Jian Liu
doaj   +1 more source

Home - About - Disclaimer - Privacy