Results 31 to 40 of about 1,010 (133)

Backtracking-based dynamic programming for resolving transmit ambiguities in WSN localization

open access: yesEURASIP Journal on Advances in Signal Processing, 2018
The complexity of agent localization increases significantly when unique identification of the agents is not possible. Corresponding application cases include multiple-source localization, in which the agents do not have identification sequences at all ...
Stephan Schlupkothen   +2 more
doaj   +1 more source

Sufficient conditions for sound tree hashing modes [PDF]

open access: yes, 2009
We consider the general case of tree hashing modes that make use of an underlying compression function. We consider such a tree hashing mode sound if differentiating it from a random oracle, assuming the underlying compression function is a random oracle
  +3 more
core   +1 more source

Security of Even–Mansour Ciphers under Key-Dependent Messages

open access: yesIACR Transactions on Symmetric Cryptology, 2017
The iterated Even–Mansour (EM) ciphers form the basis of many blockcipher designs. Several results have established their security in the CPA/CCA models, under related-key attacks, and in the indifferentiability framework. In this work, we study the Even–
Pooya Farshim   +2 more
doaj   +1 more source

Revisiting the Indifferentiability of the Sum of Permutations [PDF]

open access: yes, 2023
The sum of two n-bit pseudorandom permutations is known to behave like a pseudorandom function with n bits of security. A recent line of research has investigated the security of two public n-bit permutations and its degree of indifferentiability. Mandal et al. (INDOCRYPT 2010) proved 2n/3-bit security, Mennink and Preneel (ACNS 2015) pointed out a non-
Gunsing, A.C.   +4 more
openaire   +1 more source

Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing [PDF]

open access: yes, 2010
In November 2007 NIST announced that it would organize the SHA-3 competition to select a new cryptographic hash function family by 2012. In the selection process, hardware performances of the candidates will play an important role.
Akın, Abdulkadir   +6 more
core   +2 more sources

Localization of ambiguously identifiable wireless agents: complexity analysis and efficient algorithms

open access: yesEURASIP Journal on Advances in Signal Processing, 2018
In the localization of wireless agents, ambiguous measurements have significant implications regarding the complexity and quality of the agents’ positioning.
Stephan Schlupkothen, Gerd Ascheid
doaj   +1 more source

The decay of quantum correlations between quantum dot spin qubits and the characteristics of its magnetic field dependence

open access: yes, 2014
We address the question of the role of quantum correlations beyond entanglement in context of quantum magnetometry. To this end, we study the evolution of the quantum discord, measured by the rescaled discord, of two electron-spin qubits interacting with
Horodecki, Paweł   +2 more
core   +1 more source

Well/ill-posedness for the dissipative Navier–Stokes system in generalized Carleson measure spaces

open access: yesAdvances in Nonlinear Analysis, 2017
As an essential extension of the well known case β∈(12,1]{\beta\kern-1.0pt\in\kern-1.0pt({\frac{1}{2}},1]} to the hyper-dissipative case β∈(1,∞){\beta\kern-1.0pt\in\kern-1.0pt(1,\infty)}, this paper establishes both well-posedness and ill-posedness (not ...
Wang Yuzhao, Xiao Jie
doaj   +1 more source

Measures of Relationship Power Dynamics in Romantic Relationships

open access: yesJournal of Family Theory &Review, Volume 18, Issue 1, Page 170-191, March 2026.
ABSTRACT Power is central to understanding romantic relationship dynamics. Yet, the study of relationship power lacks consistent measurement or agreement on the latent construct. Valid measurement is essential to align theory and research and increase the likelihood of replicability and comparability between studies.
Eleanor J. Junkins   +4 more
wiley   +1 more source

Derivation of BGK models for mixtures

open access: yes, 2012
International audienceThis paper is devoted to the construction of a BGK operator for gas mixtures. The construction is based as in ([12], [13]) on the introduction of relaxation coefficients and a principle of minimization of the entropy under ...
Brull, Stéphane   +2 more
core   +4 more sources

Home - About - Disclaimer - Privacy