Results 41 to 50 of about 1,010 (133)

Field Observations of Decreasing Rock Fracturing Rates Over Geologic Time

open access: yesJournal of Geophysical Research: Earth Surface, Volume 131, Issue 1, January 2026.
Abstract Rock fracturing regulates the topography, carbon cycle, geologic hazards, and infrastructure degradation of the Earth. Yet, there remains a paucity of constraints on long‐term fracturing behavior. Here we use field measurements of 2221 clasts across a range of environments and rock types to show that the number and total length of fractures in
M. Rasmussen   +17 more
wiley   +1 more source

Fast learning rate of multiple kernel learning: Trade-off between sparsity and smoothness [PDF]

open access: yes, 2013
We investigate the learning rate of multiple kernel learning (MKL) with $\ell_1$ and elastic-net regularizations. The elastic-net regularization is a composition of an $\ell_1$-regularizer for inducing the sparsity and an $\ell_2$-regularizer for ...
Sugiyama, Masashi, Suzuki, Taiji
core   +2 more sources

To Pad or Not to Pad? Padding-Free Arithmetization-Oriented Sponges

open access: yesIACR Transactions on Symmetric Cryptology
The sponge is a popular construction for hashing and keyed hashing, and the duplex for authenticated encryption. They are proven to achieve approximately 2c/2 security, where c is the so-called capacity.
Charlotte Lefevre   +2 more
doaj   +1 more source

Elucidating Mechanisms of Gelation, Fiber Assembly, and Stability of Injectable Decellularized Extracellular Matrix Biomaterials

open access: yesBiopolymers, Volume 116, Issue 4, July 2025.
Fundamental materials characterization was performed on two decellularized extracellular matrix (ECM) biomaterials (ECM hydrogel and intravascularly infusible ECM) to determine the mechanism of fibril assembly and the impact of storage conditions. Microscopy revealed type I collagen lateral and longitudinal growth, which drove gelation of the hydrogel.
Alexander Chen   +7 more
wiley   +1 more source

On the Design of Secure and Fast Double Block Length Hash Functions [PDF]

open access: yes, 2008
In this work the security of the rate-1 double block length hash functions, which based on a block cipher with a block length of n-bit and a key length of 2n-bit, is reconsidered.
Chen, Kefei, Gong, Z., Lai, X.J.
core   +3 more sources

The relation between the quantum discord and quantum teleportation: the physical interpretation of the transition point between different quantum discord decay regimes

open access: yes, 2015
We study quantum teleportation via Bell-diagonal mixed states of two qubits in the context of the intrinsic properties of the quantum discord. We show that when the quantum-correlated state of the two qubits is used for quantum teleportation the ...
Cywiński, Łukasz, Roszak, Katarzyna
core   +1 more source

Indifferentiability of Confusion-Diffusion Networks [PDF]

open access: yes, 2016
We show the first positive results for the indifferentiability security of the confusion-diffusion networks which are extensively used in the design of block ciphers and hash functions. In particular, our result shows that a constant number of confusion-diffusion rounds is sufficient to extend the domain of a public random permutation.
Dodis, Yevgeniy   +3 more
openaire   +2 more sources

Surface Characterization of Skin Substitute Materials

open access: yesSkin Research and Technology, Volume 31, Issue 7, July 2025.
ABSTRACT Background Transdermal therapeutic systems use substance transport through the skin to provide an active pharmaceutical ingredient. To ensure a reliable supply, adhesion to skin must be guaranteed. In practice in vivo studies as well as in vitro studies on steel (ISO‐standard for self‐adhesive tapes) are used.
Alexander Jaekel, Michaela Wirtz
wiley   +1 more source

Lizards and amphisbaenians (Reptilia, Squamata) from the middle Eocene of Mazaterón (Soria, Spain)

open access: yesThe Anatomical Record, Volume 308, Issue 6, Page 1753-1768, June 2025.
Abstract The assemblage of lizards and amphisbaenians (Reptilia, Squamata) from the middle Eocene locality of Mazaterón (Spain) is described. Considering the rather limited material available for the study, the assemblage shows a moderate diversity with eight taxa corresponding to five different families.
Arnau Bolet
wiley   +1 more source

Generic Indifferentiability Proofs of Hash Designs [PDF]

open access: yes2012 IEEE 25th Computer Security Foundations Symposium, 2012
Hash functions are the swiss army knife of cryptographers. They are used to generate unique identifiers in hash-and-sign signatures, as one-way functions for one-time-password, to break the structure of the input in key derivation functions and also for authentications.
Marion Daubignard   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy