Results 101 to 110 of about 15,333 (299)
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch +4 more
wiley +1 more source
GB-hash : Hash Functions Using Groebner Basis
In this paper we present an improved version of HF-hash, viz., GB-hash : Hash Functions Using Groebner Basis. In case of HF-hash, the compression function consists of 32 polynomials with 64 variables which were taken from the first 32 polynomials of hidden field equations challenge-1 by forcing last 16 variables as 0.
Dey, Dhananjoy +2 more
openaire +2 more sources
The power of primes: security of authentication based on a universal hash-function family [PDF]
Basel Alomair +2 more
openalex +1 more source
TNCOA: Efficient Exploration via Observation‐Action Constraint on Trajectory‐Based Intrinsic Reward
ABSTRACT Efficient exploration is critical in handling sparse rewards and partial observability in deep reinforcement learning. However, most existing intrinsic reward methods based on novelty rely on single‐step observations or Euclidean distances.
Jingxiang Ma, Hongbin Ma, Youzhi Zhang
wiley +1 more source
Universal classes of hash functions (Extended Abstract) [PDF]
J. Lawrence Carter, Mark N. Wegman
openalex +1 more source
Quantum cryptanalysis of hash and claw-free functions [PDF]
Gilles Brassard +2 more
openalex +1 more source
Locality-sensitive hashing in function spaces [PDF]
Will Shand, Stephen Becker
openalex +1 more source
Cryptanalysis of some chaos-based keyed hash functions
By employing the methods including statistic analysis,birthday attacks,and so on,the forging attacks and equivalent-key recovering attacks towards a categories keyed hash functions that are based on chaos systems were pro-posed.Meanwhile,the reasons for ...
ZHENG Shi-hui1 +3 more
doaj +2 more sources
ABSTRACT In Spain, under General Franco's regime, homosexuality was regarded as an antisocial and dangerous behaviour. It was thus pursued both by the police and judicial courts. The Law on Vagrants and Crooks (1954) and, subsequently, the Law on Dangerousness and Social Rehabilitation (1970) constituted the legal mechanisms used by the dictatorship to
Jordi Mas Grau, Rafael Cáceres‐Feria
wiley +1 more source
Fast AES-Based Universal Hash Functions and MACs
Ultra-fast AES round-based software cryptographic authentication/encryption primitives have recently seen important developments, fuelled by the authenticated encryption competition CAESAR and the prospect of future high-profile applications such as ...
Augustin Bariant +5 more
doaj +1 more source

