Results 101 to 110 of about 15,333 (299)

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch   +4 more
wiley   +1 more source

GB-hash : Hash Functions Using Groebner Basis

open access: yes, 2010
In this paper we present an improved version of HF-hash, viz., GB-hash : Hash Functions Using Groebner Basis. In case of HF-hash, the compression function consists of 32 polynomials with 64 variables which were taken from the first 32 polynomials of hidden field equations challenge-1 by forcing last 16 variables as 0.
Dey, Dhananjoy   +2 more
openaire   +2 more sources

TNCOA: Efficient Exploration via Observation‐Action Constraint on Trajectory‐Based Intrinsic Reward

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Efficient exploration is critical in handling sparse rewards and partial observability in deep reinforcement learning. However, most existing intrinsic reward methods based on novelty rely on single‐step observations or Euclidean distances.
Jingxiang Ma, Hongbin Ma, Youzhi Zhang
wiley   +1 more source

Quantum cryptanalysis of hash and claw-free functions [PDF]

open access: bronze, 1997
Gilles Brassard   +2 more
openalex   +1 more source

Cryptanalysis of some chaos-based keyed hash functions

open access: yesTongxin xuebao, 2011
By employing the methods including statistic analysis,birthday attacks,and so on,the forging attacks and equivalent-key recovering attacks towards a categories keyed hash functions that are based on chaos systems were pro-posed.Meanwhile,the reasons for ...
ZHENG Shi-hui1   +3 more
doaj   +2 more sources

Migration, Repression and Homosexual Sociability in Francoist Spain: An Analysis of the Case Files of the Special Courts of Barcelona (1965–1975)

open access: yesGender &History, EarlyView.
ABSTRACT In Spain, under General Franco's regime, homosexuality was regarded as an antisocial and dangerous behaviour. It was thus pursued both by the police and judicial courts. The Law on Vagrants and Crooks (1954) and, subsequently, the Law on Dangerousness and Social Rehabilitation (1970) constituted the legal mechanisms used by the dictatorship to
Jordi Mas Grau, Rafael Cáceres‐Feria
wiley   +1 more source

Fast AES-Based Universal Hash Functions and MACs

open access: yesIACR Transactions on Symmetric Cryptology
Ultra-fast AES round-based software cryptographic authentication/encryption primitives have recently seen important developments, fuelled by the authenticated encryption competition CAESAR and the prospect of future high-profile applications such as ...
Augustin Bariant   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy