Results 61 to 70 of about 15,333 (299)
Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley +1 more source
: In this work, Voxel‐SLAM (simultaneous localization and mapping) is introduced: a complete, accurate, and versatile LiDAR (light detection and ranging) ‐inertial SLAM system consisting of five modules: initialization, odometry, local mapping (LM), loop closure (LC), and global mapping (GM), all employing the same map representation, an adaptive voxel
Zheng Liu +9 more
wiley +1 more source
A Hash Table Without Hash Functions, and How to Get the Most Out of Your Random Bits [PDF]
William Kuszmaul
openalex +1 more source
ABSTRACT The growing impacts of climate change and energy scarcity demand environmentally sustainable refrigeration solutions. This study investigates eco‐friendly refrigerants (R152a, R290 and R600a) and their optimized ternary mixture as alternatives to R134a. Four blend compositions were analysed using experimental testing and REFPROP 10.0 modelling
M. Periyasamy, P. Senthilkumar
wiley +1 more source
Confirmation of a Non‐Transiting Planet in the Habitable Zone of the Nearby M Dwarf L 98‐59
ABSTRACT Only 40 exoplanetary systems with five or more planets are currently known. These systems are crucial for our understanding of planet formation and planet‐planet interaction. The M dwarf L 98‐59 has previously been found to show evidence of five planets, three of which are transiting.
Paul I. Schwarz +2 more
wiley +1 more source
Comparing the speed of the selected hash and encryption algorithms
The data is often the most valuable thing that we collect on our computers. Without proper data security with encryption our valuable information may be illegally used by an unauthorised person.
Dawid Górniak, Piotr Kopniak
doaj +1 more source
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil +2 more
wiley +1 more source
A Second Preimage Attack on the XOR Hash Combiner
The exclusive-or (XOR) hash combiner is a classical hash function combiner, which is well known as a good PRF and MAC combiner, and is used in practice in TLS versions 1.0 and 1.1.
Shiwei Chen +3 more
doaj +1 more source
Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier
A hash function secure in the indifferentiability framework (TCC 2004) is able to resist all meaningful generic attacks. Such hash functions also play a crucial role in establishing the security of protocols that use them as random functions.
Moody Dustin +2 more
doaj +1 more source
Simple Access to a Series of Higher Substituted Pentafluoroorthotellurate‐Based Silanes
The pentafluoroorthotellurate ligand was introduced to organo silanes. A variety of silanes with the formular RxSi(OTeF5)4–x were synthesized and characterized via spectroscopic techniques and sc‐XRD. The influence of the number of OTeF5 groups on structural properties as well as the fluoride ion affinities (FIA) has been studied and compared to other ...
Friederike Oesten +7 more
wiley +1 more source

