Results 21 to 30 of about 1,402 (165)

Verified Indifferentiable Hashing into Elliptic Curves [PDF]

open access: yesJournal of Computer Security, 2012
Many cryptographic systems based on elliptic curves are proven secure in the Random Oracle Model, assuming there exist probabilistic functions that map elements in some domain (e.g. bitstrings) onto uniformly and independently distributed points in a curve.
Barthe, Gilles   +4 more
openaire   +4 more sources

Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability [PDF]

open access: yes, 2021
Game-playing proofs constitute a powerful framework for non-quantum cryptographic security arguments, most notably applied in the context of indifferentiability. An essential ingredient in such proofs is lazy sampling of random primitives.
Czajkowski, Jan   +3 more
core   +1 more source

Some like it salty: Spatio‐temporal dynamics of salinity differentially affect anurans and caudates in coastal wetlands

open access: yesFreshwater Biology, Volume 68, Issue 7, Page 1279-1292, July 2023., 2023
Abstract Coastal wetlands are naturally subjected to salinity, which is expected to increase through global climate changes. Most species will be affected by these changes, leading to major consequences for community structure and ecosystem functioning.
Léa Lorrain‐Soligon   +3 more
wiley   +1 more source

Resource-Restricted Indifferentiability [PDF]

open access: yes, 2013
A major general paradigm in cryptography is the following argument: Whatever an adversary could do in the real world, it could just as well do in the ideal world. The standard interpretation of “just as well” is that the translation from the real to the ideal world, usually called a simulator, is achieved by a probabilistic polynomial-time algorithm ...
Demay Grégory   +3 more
openaire   +1 more source

Parkinson's disease fluid biomarkers for differential diagnosis of atypical parkinsonian syndromes

open access: yesClinical and Translational Discovery, Volume 3, Issue 1, February 2023., 2023
Parkinson's disease (PD) and atypical parkinsonian syndromes (APS) are challenging to differentiate. Traditional biomarkers such as cerebrospinal fluid (CSF) alpha‐synuclein, Aβ42, and tau cannot distinguish PD and APS patients with confidence. CSF protein misfolding cyclic amplification, real‐time quaking‐induced conversion, and neurofilament light ...
Jun Yang   +3 more
wiley   +1 more source

Influence of carbon binder domain on the performance of lithium‐ion batteries: Impact of size and fractal dimension

open access: yesElectrochemical Science Advances, Volume 3, Issue 1, February 2023., 2023
The following study establishes a link between the various possibilities of CBD cluster size and fractal dimension that may eventualize during the mixing process of slurry preparation to the resulting microstructural properties and hence to the performance of Lithium‐Ion Batteries.
Anshuman Chauhan   +3 more
wiley   +1 more source

Topological Appearance of Event Horizon: What Is the Topology of the Event Horizon That We Can See? [PDF]

open access: yes, 1997
The topology of the event horizon (TOEH) is usually believed to be a sphere. Nevertheless, some numerical simulations of gravitational collapse with a toroidal event horizon or the collision of event horizons are reported.
Siino, Masaru
core   +2 more sources

Quantifying Schedule Delay Risk in Construction Projects: A Data‐Driven Approach with BIM and Probabilistic Reliability Analysis

open access: yesAdvances in Civil Engineering, Volume 2023, Issue 1, 2023., 2023
Progress management is an important scheme of construction management. In practical affairs, many unknown factors may lead to potential project delays and make the schedule risky. To address this issue, this paper proposes a data‐driven construction progress evaluation method that employs a probabilistic reliability analysis with BIM to effectively ...
Shen Zhang, Xingyu Wang, Loke Kok Foong
wiley   +1 more source

Sequential Hashing with Minimum Padding

open access: yesCryptography, 2018
This article presents a sequential domain extension scheme with minimum padding for hashing using a compression function. The proposed domain extension scheme is free from the length extension property.
Shoichi Hirose
doaj   +1 more source

Security Analysis of BLAKE2’s Modes of Operation

open access: yesIACR Transactions on Symmetric Cryptology, 2016
BLAKE2 is a hash function introduced at ACNS 2013, which has been adopted in many constructions and applications. It is a successor to the SHA-3 finalist BLAKE, which received a significant amount of security analysis.
Atul Luykx, Bart Mennink, Samuel Neves
doaj   +1 more source

Home - About - Disclaimer - Privacy