Results 81 to 90 of about 10,388,112 (269)
Quantum Security of Hash Functions and Property-Preservation of Iterated Hashing [PDF]
This work contains two major parts: comprehensively studying the security notions of cryptographic hash functions against quantum attacks and the relationships between them; and revisiting whether Merkle-Damgard and related iterated hash constructions preserve the security properties of the compression function in the quantum setting.
Ben Hamlin, Fang Song
openaire +3 more sources
FSL-BM: Fuzzy Supervised Learning with Binary Meta-Feature for Classification
This paper introduces a novel real-time Fuzzy Supervised Learning with Binary Meta-Feature (FSL-BM) for big data classification task. The study of real-time algorithms addresses several major concerns, which are namely: accuracy, memory consumption, and ...
CP Chen+15 more
core +1 more source
A perceptual hash function to store and retrieve large scale DNA sequences
This paper proposes a novel approach for storing and retrieving massive DNA sequences.. The method is based on a perceptual hash function, commonly used to determine the similarity between digital images, that we adapted for DNA sequences.
Bailly, Xavier+3 more
core
In the control of network terminal power, due to the overall low analysis of network state, the adaptive regulation ability of communication network terminal power is poor.Therefore, the power line carrier communication network terminal power control ...
Hong XUE+4 more
doaj +2 more sources
Development of a New Post-Quantum Digital Signature Algorithm: Syrga-1
The distinguishing feature of hash-based algorithms is their high confidence in security. When designing electronic signature schemes, proofs of security reduction to certain properties of cryptographic hash functions are used.
Kunbolat Algazy+3 more
doaj +1 more source
Analysis of the Kupyna-256 Hash Function [PDF]
H2020 HECTOR ...
Dobraunig, Christoph+2 more
openaire +2 more sources
Enhanced payload volume in the least significant bits image steganography using hash function. [PDF]
Ghadi YY+5 more
europepmc +1 more source
XML data integrity based on concatenated hash function [PDF]
Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting.
Liu, B, Lu, J, Yip, YJ
core
An efficient and secure technique for image steganography using a hash function. [PDF]
Nezami ZI+5 more
europepmc +1 more source