Results 21 to 30 of about 1,402 (165)
Verified Indifferentiable Hashing into Elliptic Curves [PDF]
Many cryptographic systems based on elliptic curves are proven secure in the Random Oracle Model, assuming there exist probabilistic functions that map elements in some domain (e.g. bitstrings) onto uniformly and independently distributed points in a curve.
Barthe, Gilles +4 more
openaire +4 more sources
Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability [PDF]
Game-playing proofs constitute a powerful framework for non-quantum cryptographic security arguments, most notably applied in the context of indifferentiability. An essential ingredient in such proofs is lazy sampling of random primitives.
Czajkowski, Jan +3 more
core +1 more source
Abstract Coastal wetlands are naturally subjected to salinity, which is expected to increase through global climate changes. Most species will be affected by these changes, leading to major consequences for community structure and ecosystem functioning.
Léa Lorrain‐Soligon +3 more
wiley +1 more source
Resource-Restricted Indifferentiability [PDF]
A major general paradigm in cryptography is the following argument: Whatever an adversary could do in the real world, it could just as well do in the ideal world. The standard interpretation of “just as well” is that the translation from the real to the ideal world, usually called a simulator, is achieved by a probabilistic polynomial-time algorithm ...
Demay Grégory +3 more
openaire +1 more source
Parkinson's disease fluid biomarkers for differential diagnosis of atypical parkinsonian syndromes
Parkinson's disease (PD) and atypical parkinsonian syndromes (APS) are challenging to differentiate. Traditional biomarkers such as cerebrospinal fluid (CSF) alpha‐synuclein, Aβ42, and tau cannot distinguish PD and APS patients with confidence. CSF protein misfolding cyclic amplification, real‐time quaking‐induced conversion, and neurofilament light ...
Jun Yang +3 more
wiley +1 more source
The following study establishes a link between the various possibilities of CBD cluster size and fractal dimension that may eventualize during the mixing process of slurry preparation to the resulting microstructural properties and hence to the performance of Lithium‐Ion Batteries.
Anshuman Chauhan +3 more
wiley +1 more source
Topological Appearance of Event Horizon: What Is the Topology of the Event Horizon That We Can See? [PDF]
The topology of the event horizon (TOEH) is usually believed to be a sphere. Nevertheless, some numerical simulations of gravitational collapse with a toroidal event horizon or the collision of event horizons are reported.
Siino, Masaru
core +2 more sources
Progress management is an important scheme of construction management. In practical affairs, many unknown factors may lead to potential project delays and make the schedule risky. To address this issue, this paper proposes a data‐driven construction progress evaluation method that employs a probabilistic reliability analysis with BIM to effectively ...
Shen Zhang, Xingyu Wang, Loke Kok Foong
wiley +1 more source
Sequential Hashing with Minimum Padding
This article presents a sequential domain extension scheme with minimum padding for hashing using a compression function. The proposed domain extension scheme is free from the length extension property.
Shoichi Hirose
doaj +1 more source
Security Analysis of BLAKE2’s Modes of Operation
BLAKE2 is a hash function introduced at ACNS 2013, which has been adopted in many constructions and applications. It is a successor to the SHA-3 finalist BLAKE, which received a significant amount of security analysis.
Atul Luykx, Bart Mennink, Samuel Neves
doaj +1 more source

