Results 71 to 80 of about 123,825 (281)

SiOx‐Based Probabilistic Bits Enabling Invertible Logic Gate for Cryptographic Applications

open access: yesAdvanced Intelligent Systems, EarlyView.
To enable lightweight hardware encryption and decryption, a Ti/SiOx/Ti threshold switching device is engineered to generate controllable stochastic oscillations. By tuning the input voltage, the device produces a programmable spike probability governed by intrinsic switching dynamics, enabling probabilistic bits that construct an invertible ...
Jihyun Kim, Hyeonsik Choi, Jiyong Woo
wiley   +1 more source

Fast hash functions and convolution product

open access: yesJournal of Mathematical Cryptology, 2014
We propose a new simple and efficient family of hash functions based on matrix-vector multiplications with a competitive software implementation. The hash design combines a hard mathematical problem based on solving a system of linear equations with ...
Omar Sami, Sabri Houssem
doaj   +1 more source

PPP-Completeness with Connections to Cryptography [PDF]

open access: yes, 2018
Polynomial Pigeonhole Principle (PPP) is an important subclass of TFNP with profound connections to the complexity of the fundamental cryptographic primitives: collision-resistant hash functions and one-way permutations.
Sotiraki, Katerina   +2 more
core   +1 more source

Genomic Contributors to Congenital Diaphragmatic Hernia: Results of Exome Sequencing in 560 Probands and Cross Reference of Findings in an Independent Cohort

open access: yesAmerican Journal of Medical Genetics Part A, EarlyView.
ABSTRACT There is a strong genetic contribution to the etiology of congenital diaphragmatic hernia (CDH). This study evaluated genetic testing results and diagnostic yield for fetuses and children with CDH. This was a retrospective cohort study of exome sequencing (ES) performed at GeneDx for fetuses and children ≤ 18 years of age with CDH compared ...
Justin Blair   +9 more
wiley   +1 more source

Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared towards high performance on long inputs.
Stefan Kölbl   +3 more
doaj   +1 more source

Blockchain Technology and the Circular Economy Transition: Associations With Company Performance

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The adoption of circular economy (CE) practices in the private sector has received increasing academic and managerial attention, although the implementation of such practices continues to face significant barriers. Among Industry 4.0 technologies, blockchain has been identified as a potential factor associated with the CE transition.
Josep Llach   +3 more
wiley   +1 more source

A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids

open access: yesEntropy, 2019
Image hash is an alternative to cryptographic hash functions for checking integrity of digital images. Compared to cryptographic hash functions, an image hash or a Perceptual Hash Function (PHF) is resilient to content preserving distortions and ...
Iram Bashir   +4 more
doaj   +1 more source

On the Insertion Time of Cuckoo Hashing

open access: yes, 2013
Cuckoo hashing is an efficient technique for creating large hash tables with high space utilization and guaranteed constant access times. There, each item can be placed in a location given by any one out of k different hash functions.
Fountoulakis, Nikolaos   +2 more
core   +1 more source

Hyperledger Fabric for the (digitalized) lifecycle of construction products: Applied review on fastening technology

open access: yesCivil Engineering Design, Volume 7, Issue 1, Page 9-22, March 2025.
Abstract Blockchain technology is a digital decentralized data ledger recording transactions in an encrypted format. Its implementation can potentially hold significant advantages for the built environment, particularly in manufacturing and building product usage aligned with Building Information Modeling (BIM). This paradigm shift toward decentralized
Aileen Pfeil   +2 more
wiley   +1 more source

Balanced Families of Perfect Hash Functions and Their Applications [PDF]

open access: yes, 2007
The construction of perfect hash functions is a well-studied topic. In this paper, this concept is generalized with the following definition. We say that a family of functions from $[n]$ to $[k]$ is a $\delta$-balanced $(n,k)$-family of perfect hash ...
Alon, Noga, Gutner, Shai
core   +1 more source

Home - About - Disclaimer - Privacy