Results 121 to 130 of about 123,825 (281)
GB-hash : Hash Functions Using Groebner Basis
In this paper we present an improved version of HF-hash, viz., GB-hash : Hash Functions Using Groebner Basis. In case of HF-hash, the compression function consists of 32 polynomials with 64 variables which were taken from the first 32 polynomials of hidden field equations challenge-1 by forcing last 16 variables as 0.
Dey, Dhananjoy +2 more
openaire +2 more sources
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch +4 more
wiley +1 more source
ABSTRACT In Spain, under General Franco's regime, homosexuality was regarded as an antisocial and dangerous behaviour. It was thus pursued both by the police and judicial courts. The Law on Vagrants and Crooks (1954) and, subsequently, the Law on Dangerousness and Social Rehabilitation (1970) constituted the legal mechanisms used by the dictatorship to
Jordi Mas Grau, Rafael Cáceres‐Feria
wiley +1 more source
Cryptanalysis of some chaos-based keyed hash functions
By employing the methods including statistic analysis,birthday attacks,and so on,the forging attacks and equivalent-key recovering attacks towards a categories keyed hash functions that are based on chaos systems were pro-posed.Meanwhile,the reasons for ...
ZHENG Shi-hui1 +3 more
doaj +2 more sources
We evaluate a government‐funded matching policy for retirement savings contributions targeted at low‐ and middle‐income individuals. Using a difference‐in‐difference approach, we exploit administrative changes to the Australian Government's retirement contribution matching (co‐contribution) policy to identify the impact of the programme on savings ...
Kristen Sobeck, Robert Breunig
wiley +1 more source
Fast AES-Based Universal Hash Functions and MACs
Ultra-fast AES round-based software cryptographic authentication/encryption primitives have recently seen important developments, fuelled by the authenticated encryption competition CAESAR and the prospect of future high-profile applications such as ...
Augustin Bariant +5 more
doaj +1 more source
Caution Ahead: Numerical Reasoning and Look‐Ahead Bias in AI Models
ABSTRACT Recent work within accounting and finance has highlighted that modern AI systems exhibit superhuman performance on a variety of foundational activities within these fields. However, the literature often does not provide economic rationale for why AI models seem to outperform, largely because these models are a black box.
BRADFORD LEVY
wiley +1 more source
Abstract We estimate the price impact of very nearby concurrently listed properties in the Sydney housing market and assess their competition effects. We apply a hedonic model with spatiotemporal effects regularized via a graph Laplacian prior at the month‐by‐SA2 regional level to seven SA4 subregions of metropolitan Sydney. The model structure enables
Willem P. Sijp, Mengheng Li
wiley +1 more source
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo +3 more
wiley +1 more source

