Results 61 to 70 of about 13,015 (291)

Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications

open access: yesIEEE Access, 2022
Secure communication is important for Internet of Things (IoT) applications, to avoid cyber-security attacks. One of the key security aspects is data integrity, which can be protected by employing cryptographic hash functions.
Wai-Kong Lee   +5 more
doaj   +1 more source

The exponential hash function

open access: yesACM Journal of Experimental Algorithmics, 1997
In this paper an efficient open address hash function called exponential hashing is developed. The motivation for this hash function resulted from our ongoing efforts to apply dynamical systems theory to the study of hashing; however, the analysis conducted in this paper is primarily based on traditional number theory. Proofs of optimal table parameter
Chaouki T. Abdallah   +2 more
openaire   +2 more sources

Pupylation‐Based Proximity Labeling Unravels a Comprehensive Protein and Phosphoprotein Interactome of the Arabidopsis TOR Complex

open access: yesAdvanced Science, EarlyView.
The target of rapamycin (TOR) complex is a central plant growth regulator. Here, the protein–protein interactions underlying its various functions are mapped by pupylation‐based proximity‐labeling in Arabidopsis, using TOR complex subunits LST8‐1 and RAPTOR1, alongside TOR inhibitor FK506‐binding protein, as baits.
Shuai Zheng   +9 more
wiley   +1 more source

EESSI: A cross‐platform ready‐to‐use optimised scientific software stack

open access: yesSoftware: Practice and Experience, Volume 53, Issue 1, Page 176-210, January 2023., 2023
Abstract Getting scientific software installed correctly and ensuring it performs well has been a ubiquitous problem for several decades now, which is compounded currently by the changing landscape of computational science with the (re‐)emergence of different microprocessor families, and the expansion to additional scientific domains like artificial ...
Bob Dröge   +5 more
wiley   +1 more source

JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS

open access: yesСучасні інформаційні системи, 2019
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova   +3 more
doaj   +1 more source

Universal classes of hash functions

open access: yesJournal of Computer and System Sciences, 1979
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieval on keys. The algorithm makes a random choice of hash function from a suitable class of hash functions. Given any sequence of inputs the expected time (averaging over all functions in the class) to store and retrieve elements is linear in the length of ...
J. Lawrence Carter, Mark N. Wegman
openaire   +2 more sources

Medical Image Hybrid Watermark Algorithm Based on Frequency Domain Processing and Inception v3

open access: yesAdvanced Intelligent Systems, EarlyView.
Frequency domain processing and Inceptionv3 method is used in this article for digital image watermarking of medical images. The algorithm extracts feature vectors from medical images using discrete wavelet transform and discrete cosine transform, enhancing the robustness of the image watermark With the widespread use of digital medical images in ...
Yu Fan   +4 more
wiley   +1 more source

A better hash method for high-fidelity Monte Carlo simulations on nuclear reactors

open access: yesFrontiers in Energy Research, 2023
With the increasing demand for high-fidelity nuclear reactor simulations, the acceleration of Monte Carlo particle transport codes is becoming a core problem.
Kaiwen Li   +4 more
doaj   +1 more source

The Lane hash function

open access: yes, 2009
We propose the cryptographic hash function Lane as a candidate for the SHA-3 competition organised by NIST. Lane is an iterated hash function supporting multiple digest sizes. Components of the AES block cipher are reused as building blocks. Lane aims to be secure, easy to understand, elegant and flexible in implementation.
Indesteege, Sebastiaan   +7 more
openaire   +2 more sources

Energy Consumption of Hash Functions

open access: yesElectronics and Electrical Engineering, 2012
We analyse energy efficiency versus quality characteristics of hashing algorithms in a mobile device and describe methodologies for energy measurement on a Java-enabled smart phone. Energy efficiency of 17 hash functions (Adler32, Crc16, Crc32, Haval256, MD2, MD4, MD5, MD6, SHA1, SHA224, SHA256, SHA384, SHA512, Skein, SV1, Tiger, Whirlpool) is ...
Damasevicius, R.   +4 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy