Results 41 to 50 of about 13,015 (291)
Electron contact interlayers for low‐temperature‐processed crystalline silicon solar cells
In this study, a series of interlayers are trialed as electron‐selective contacts on crystalline silicon, including several materials that were previously untested in this application. Most of these interlayers were found to achieve mΩcm2‐scale specific contact resistivities.
Jesus Ibarra Michel+11 more
wiley +1 more source
Verification of Implementations of Cryptographic Hash Functions
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang+5 more
doaj +1 more source
Universal hash functions from quantum procedures
Modern quantum technologies are NISQ (Noisy Intermediate-Scale Quantum) devices, which are used to create insufficiently accurate quantum computers with low computing power.
F.M. Ablayev, M.T. Ziatdinov
doaj +1 more source
Germline variants in CDKN2A wild‐type melanoma prone families
Among melanoma‐prone families, wild‐type for CDKN2A and CDK4, some have pathogenic variants in genes not usually linked to melanoma. Furthermore, rare XP‐related variants and variants in MC1R are enriched in such families. Germline pathogenic variants in CDKN2A are well established as an underlying cause of familial malignant melanoma. While pathogenic
Gjertrud T. Iversen+5 more
wiley +1 more source
Real World Applications of MGR, Neeva and KN-Hash
Hash functions have prominent role in cryptography because of their ubiquitous applications in real world. Earlier, it was used for authentication only but with continuous research and development, it has been started using in almost every branch of ...
Khushboo BUSSI+2 more
doaj +1 more source
Hash Function Based on Controlled Alternate Quantum Walks With Memory (September 2021)
We propose a Quantum inspired Hash Function using controlled alternate quantum walks with Memory on cycles (QHFM), where the $j$th message bit decides whether to run quantum walk with one-step memory or to run quantum walk with two-step memory at the $j ...
Qing Zhou, Songfeng Lu
doaj +1 more source
The breaking of the AR Hash Function [PDF]
<p>The AR hash function has been proposed by <em> Algorithmic Research Ltd</em>. It has been circulated in the ISO community (Working group 2, document WG2/N179), and is currently being used in practice in the German banking world. AR hash is based on DES and a variant of the CBC mode.
Damgård, Ivan Bjerre+1 more
openaire +5 more sources
Abstract Purpose Palliative radiotherapy comprises a significant portion of the radiation treatment workload. Volumetric‐modulated arc therapy (VMAT) improves dose conformity and, in conjunction with flattening filter free (FFF) delivery, can decrease treatment times, both of which are desirable in a population with a high probability of retreatment ...
Madeleine L. Van de Kleut+2 more
wiley +1 more source
A novel metadata schema is introduced to address the sparsity of microstructure‐sensitive mechanical data. The design follows the material modeling workflow, as each run results in the definition of unique data objects. The schema includes categorical elements to ensure findability, accessibility, interoperability, and reusability (FAIR). This approach
Ronak Shoghi, Alexander Hartmaier
wiley +1 more source
ON THE UNIVERSAL TREE MODE OF HASH CODE GENERATION
Classical approaches to the construction of hash function modes, based on the using of iterative procedures, do not allow efficient processing of large amounts of data and can’t be adapted to parallel computing architectures.
Dmitriy S. Bogdanov+2 more
doaj +1 more source