Results 91 to 100 of about 1,334,459 (231)
Verification of a Merkle Patricia Tree Library Using F* [PDF]
Sota Sato +4 more
openalex +1 more source
Modified Hash to Obtain Random Subset-Tree (MHORST) Using Merkle Tree and Mersenne Twister
The development of quantum computing triggers new challenges in data security, particularly in addressing attacks that can solve complex mathematical problems on the fly.
Faidhil Nugrah Ramadhan Ahmad +1 more
doaj +1 more source
TreePIR: Efficient Private Retrieval of Merkle Proofs via Tree Colorings with Fast Indexing and Zero Storage Overhead [PDF]
Quang Cao +11 more
openalex +1 more source
Fractional Verkle Trees for Scalable Post-Quantum Signatures
Quantum computers threaten to break widely used cryptosystems like RSA and ECC, forcing us to develop new quantum-resistant alternatives. While hash-based signatures like SPHINCS+ offer a proven solution, their reliance on Merkle trees result in large ...
Maksim Iavich +2 more
doaj +1 more source
Notarial timestamps savings in logs management via Merkle trees and Key\n Derivation Functions [PDF]
Andrea Barontini
openalex +1 more source
The future industry development for healthcare services needs an integrated edge, fog, and cloud computing infrastructures. The medical data security and integrity schemes help to operate the data carefully in healthcare networks.
Mohammad Gouse Galety +3 more
doaj +1 more source
FC-LSR: Fog Computing-Based Lightweight Sybil Resistant Scheme in 5G-Enabled Vehicular Networks
Vehicular networks with Fifth-Generation (5G) are a new form of wireless communication that could greatly benefit society by lowering the number of preventable car accidents and entertaining passengers in a variety of ways.
Abdulwahab Ali Almazroi +5 more
doaj +1 more source
CoSMeTIC: Zero-Knowledge Computational Sparse Merkle Trees with Inclusion-Exclusion Proofs for Clinical Research [PDF]
Mohammad Shahid +4 more
openalex +2 more sources
In today's digital world, the rapid advancement of Information Technology (IT) has made it crucial to prioritize the protection and management of data storage and retrieval. It is vital to challenge the difficulties related to dispersed and decentralized
Yu Wang
doaj +1 more source
Knapsack Problem Solution based on Knapsack Packing Tree Search
A number of asymmetric cryptosystems (including one of the very first asymmetric cryptosystems – the Merkle–Hellman cryptosystem) are based on the knapsack problem.
Mikhail Andreevich Kupriyashin +1 more
doaj

