Results 61 to 70 of about 157,357 (284)
AbstractHash functions are one-way functions that map arbitrary-length input to fixed-length output. Moreover, they have many cryptographic applications, such as integrity checks, password storage, and signatures. Cryptographic hash functions have some additional properties that can be formulated as hard problems: pre-image resistance, second pre-image
Urs Wagner, Thomas Lugrin
openaire +1 more source
Neural Fields for Highly Accelerated 2D Cine Phase Contrast MRI
ABSTRACT 2D cine phase contrast (CPC) MRI provides quantitative information on blood velocity and flow within the human vasculature. However, data acquisition is time‐consuming, motivating the reconstruction of the velocity field from undersampled measurements to reduce scan times. In this work, neural fields are proposed as a continuous spatiotemporal
Pablo Arratia +7 more
wiley +1 more source
The Usefulness of Multilevel Hash Tables with Multiple Hash Functions in Large Databases [PDF]
In this work, attempt is made to select three good hash functions which uniformly distribute hash values that permute their internal states and allow the input bits to generate different output bits.
Akinwale, A. T., Ibharalu, F. T.
core +1 more source
Leftover Hashing Against Quantum Side Information
The Leftover Hash Lemma states that the output of a two-universal hash function applied to an input with sufficiently high entropy is almost uniformly random.
Renner, Renato +3 more
core +1 more source
INB3P is a multimodal framework for blood–brain barrier‐penetrating peptide prediction under extreme data scarcity and class imbalance. By combining physicochemical‐guided augmentation, sequence–structure co‐attention, and imbalance‐aware optimization, it improves predictive performance and interpretability.
Jingwei Lv +11 more
wiley +1 more source
Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol
Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use.
Shugo Mikami +3 more
doaj +1 more source
An application of residue number system arithmetics to secure hash functions design [PDF]
This paper presents a cryptographic hash function based on the Residue Number System (RNS), designed to enhance security and computational efficiency. The function leverages the parallelism and modular properties of RNS to achieve high-speed processing ...
Pavlović Milija +3 more
doaj +1 more source
Evolving hash functions by means of genetic programming [PDF]
Proceedings of the 8th annual conference on Genetic and evolutionary computation. Seattle, Washington, USA, July 08-12, 2006The design of hash functions by means of evolutionary computation is a relatively new and unexplored problem. In this work, we use
Estébanez Tascón, César +3 more
core +5 more sources
This study introduces a tree‐based machine learning approach to accelerate USP8 inhibitor discovery. The best‐performing model identified 100 high‐confidence repurposable compounds, half already approved or in clinical trials, and uncovered novel scaffolds not previously studied. These findings offer a solid foundation for rapid experimental follow‐up,
Yik Kwong Ng +4 more
wiley +1 more source
Hashing with binary autoencoders
An attractive approach for fast search in image databases is binary hashing, where each high-dimensional, real-valued image is mapped onto a low-dimensional, binary vector and the search is done in this binary space.
Carreira-Perpiñán, Miguel Á. +1 more
core +1 more source

