Results 31 to 40 of about 1,010 (133)
Backtracking-based dynamic programming for resolving transmit ambiguities in WSN localization
The complexity of agent localization increases significantly when unique identification of the agents is not possible. Corresponding application cases include multiple-source localization, in which the agents do not have identification sequences at all ...
Stephan Schlupkothen +2 more
doaj +1 more source
Sufficient conditions for sound tree hashing modes [PDF]
We consider the general case of tree hashing modes that make use of an underlying compression function. We consider such a tree hashing mode sound if differentiating it from a random oracle, assuming the underlying compression function is a random oracle
+3 more
core +1 more source
Security of Even–Mansour Ciphers under Key-Dependent Messages
The iterated Even–Mansour (EM) ciphers form the basis of many blockcipher designs. Several results have established their security in the CPA/CCA models, under related-key attacks, and in the indifferentiability framework. In this work, we study the Even–
Pooya Farshim +2 more
doaj +1 more source
Revisiting the Indifferentiability of the Sum of Permutations [PDF]
The sum of two n-bit pseudorandom permutations is known to behave like a pseudorandom function with n bits of security. A recent line of research has investigated the security of two public n-bit permutations and its degree of indifferentiability. Mandal et al. (INDOCRYPT 2010) proved 2n/3-bit security, Mennink and Preneel (ACNS 2015) pointed out a non-
Gunsing, A.C. +4 more
openaire +1 more source
Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing [PDF]
In November 2007 NIST announced that it would organize the SHA-3 competition to select a new cryptographic hash function family by 2012. In the selection process, hardware performances of the candidates will play an important role.
Akın, Abdulkadir +6 more
core +2 more sources
In the localization of wireless agents, ambiguous measurements have significant implications regarding the complexity and quality of the agents’ positioning.
Stephan Schlupkothen, Gerd Ascheid
doaj +1 more source
We address the question of the role of quantum correlations beyond entanglement in context of quantum magnetometry. To this end, we study the evolution of the quantum discord, measured by the rescaled discord, of two electron-spin qubits interacting with
Horodecki, Paweł +2 more
core +1 more source
Well/ill-posedness for the dissipative Navier–Stokes system in generalized Carleson measure spaces
As an essential extension of the well known case β∈(12,1]{\beta\kern-1.0pt\in\kern-1.0pt({\frac{1}{2}},1]} to the hyper-dissipative case β∈(1,∞){\beta\kern-1.0pt\in\kern-1.0pt(1,\infty)}, this paper establishes both well-posedness and ill-posedness (not ...
Wang Yuzhao, Xiao Jie
doaj +1 more source
Measures of Relationship Power Dynamics in Romantic Relationships
ABSTRACT Power is central to understanding romantic relationship dynamics. Yet, the study of relationship power lacks consistent measurement or agreement on the latent construct. Valid measurement is essential to align theory and research and increase the likelihood of replicability and comparability between studies.
Eleanor J. Junkins +4 more
wiley +1 more source
Derivation of BGK models for mixtures
International audienceThis paper is devoted to the construction of a BGK operator for gas mixtures. The construction is based as in ([12], [13]) on the introduction of relaxation coefficients and a principle of minimization of the entropy under ...
Brull, Stéphane +2 more
core +4 more sources

