Results 271 to 280 of about 619,034 (297)
Intentionality and Attentionality Dynamics in an Institutional Change Process
Abstract In this article, we explore how actors' intentionality emerges, develops, and co‐evolves with institutional change. Although intentions are essential in shaping institutional change agents' motivations and actions, our understanding of their dynamics is limited and biased by the assumption that intentions are usually identifiable prior to ...
Sofiane Baba, Taïeb Hafsi, Omar Hemissi
wiley +1 more source
Rural reticence to inform physicians of cannabis use
Abstract Purpose Over 75% of Americans have legal access to medical cannabis, though physical access is not uniform and can be difficult for rural residents. Additionally, substantial stigma remains in using medical cannabis, particularly within the health care system. This article argues that rural Americans may be particularly affected by such stigma
Daniel J. Mallinson+1 more
wiley +1 more source
ABSTRACT Children with Prader–Willi syndrome are at increased risk of both obstructive and central sleep apnoea. In addition, these children have impaired autonomic control, which may be exacerbated by sleep apnoea. The aim of this study was to compare autonomic control using heart rate variability and nocturnal dipping of heart rate in children with ...
Okkes R. Patoglu+6 more
wiley +1 more source
Consider the set ℋ of all linear (or affine) transformations between two vector spaces over a finite field F . We study how good ℋ is as a class of hash functions, namely we consider hashing a set S of size n into a range having the same cardinality n
Alon, Noga+4 more
openaire +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cryptologia, 2019
GOST-R 34.11-94 is a Russian standard cryptographic hash function that was introduced in 1994 by the Russian Federal Agency for the purposes of information processing, information security, and dig...
Dhananjoy Dey+3 more
openaire +2 more sources
GOST-R 34.11-94 is a Russian standard cryptographic hash function that was introduced in 1994 by the Russian Federal Agency for the purposes of information processing, information security, and dig...
Dhananjoy Dey+3 more
openaire +2 more sources
2021
So far we have studied various hash function properties as well as use cases of hash functions. When unkeyed or used with a public key, hash functions can be collision resistant, second-preimage resistant, or one-way.
Marc Fischlin, Arno Mittelbach
openaire +2 more sources
So far we have studied various hash function properties as well as use cases of hash functions. When unkeyed or used with a public key, hash functions can be collision resistant, second-preimage resistant, or one-way.
Marc Fischlin, Arno Mittelbach
openaire +2 more sources
Trapdoor Hash Functions and Their Applications
2019We introduce a new primitive, called trapdoor hash functions (TDH), which are hash functions H : {0, 1}n → {0, 1} λ with additional trapdoor function-like properties. Specifically, given an index i ∈ [n], TDHs allow for sampling an encoding key ek (that hides i) along with a corresponding trapdoor.
Dottling N.+5 more
openaire +3 more sources
Journal of Information and Optimization Sciences, 2001
RC6 was a candidate encryption algorithm for AES selections which emphasizes on the security, simplicity and performance of the algorithm. The round keys of RC6 are generated from the input key words by a certain amount of “one-way” according to the authors’ claims.
Yi-Shiung Yeh, Jue-Sam Chou
openaire +2 more sources
RC6 was a candidate encryption algorithm for AES selections which emphasizes on the security, simplicity and performance of the algorithm. The round keys of RC6 are generated from the input key words by a certain amount of “one-way” according to the authors’ claims.
Yi-Shiung Yeh, Jue-Sam Chou
openaire +2 more sources
Choosing Best Hashing Strategies and Hash Functions [PDF]
The paper gives the guideline to choose a best suitable hashing method hash function for a particular problem. After studying the various problem we find some criteria has been found to predict the best hash method and hash function for that problem. We present six suitable various classes of hash functions in which most of the problems can find their ...
Deepak Garg, Mahima Singh
openaire +1 more source
Cryptographic Hash Functions [PDF]
In this chapter, we discuss cryptographic hash functions. They are used, for example, in digital signatures. Throughout this chapter, we assume that Σ is an alphabet.
openaire +1 more source