Results 61 to 70 of about 13,015 (291)
Secure communication is important for Internet of Things (IoT) applications, to avoid cyber-security attacks. One of the key security aspects is data integrity, which can be protected by employing cryptographic hash functions.
Wai-Kong Lee+5 more
doaj +1 more source
In this paper an efficient open address hash function called exponential hashing is developed. The motivation for this hash function resulted from our ongoing efforts to apply dynamical systems theory to the study of hashing; however, the analysis conducted in this paper is primarily based on traditional number theory. Proofs of optimal table parameter
Chaouki T. Abdallah+2 more
openaire +2 more sources
The target of rapamycin (TOR) complex is a central plant growth regulator. Here, the protein–protein interactions underlying its various functions are mapped by pupylation‐based proximity‐labeling in Arabidopsis, using TOR complex subunits LST8‐1 and RAPTOR1, alongside TOR inhibitor FK506‐binding protein, as baits.
Shuai Zheng+9 more
wiley +1 more source
EESSI: A cross‐platform ready‐to‐use optimised scientific software stack
Abstract Getting scientific software installed correctly and ensuring it performs well has been a ubiquitous problem for several decades now, which is compounded currently by the changing landscape of computational science with the (re‐)emergence of different microprocessor families, and the expansion to additional scientific domains like artificial ...
Bob Dröge+5 more
wiley +1 more source
JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS
The subject of this research is the development of methods of protection against attacks on third-party JavaScript and the document object model (DOM).
Irada Rahimova+3 more
doaj +1 more source
Universal classes of hash functions
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieval on keys. The algorithm makes a random choice of hash function from a suitable class of hash functions. Given any sequence of inputs the expected time (averaging over all functions in the class) to store and retrieve elements is linear in the length of ...
J. Lawrence Carter, Mark N. Wegman
openaire +2 more sources
Medical Image Hybrid Watermark Algorithm Based on Frequency Domain Processing and Inception v3
Frequency domain processing and Inceptionv3 method is used in this article for digital image watermarking of medical images. The algorithm extracts feature vectors from medical images using discrete wavelet transform and discrete cosine transform, enhancing the robustness of the image watermark With the widespread use of digital medical images in ...
Yu Fan+4 more
wiley +1 more source
A better hash method for high-fidelity Monte Carlo simulations on nuclear reactors
With the increasing demand for high-fidelity nuclear reactor simulations, the acceleration of Monte Carlo particle transport codes is becoming a core problem.
Kaiwen Li+4 more
doaj +1 more source
We propose the cryptographic hash function Lane as a candidate for the SHA-3 competition organised by NIST. Lane is an iterated hash function supporting multiple digest sizes. Components of the AES block cipher are reused as building blocks. Lane aims to be secure, easy to understand, elegant and flexible in implementation.
Indesteege, Sebastiaan+7 more
openaire +2 more sources
Energy Consumption of Hash Functions
We analyse energy efficiency versus quality characteristics of hashing algorithms in a mobile device and describe methodologies for energy measurement on a Java-enabled smart phone. Energy efficiency of 17 hash functions (Adler32, Crc16, Crc32, Haval256, MD2, MD4, MD5, MD6, SHA1, SHA224, SHA256, SHA384, SHA512, Skein, SV1, Tiger, Whirlpool) is ...
Damasevicius, R.+4 more
openaire +3 more sources