Results 21 to 30 of about 1,334,459 (231)
Efficient computation of hashes [PDF]
The sequential computation of hashes at the core of many distributed storage systems and found, for example, in grid services can hinder efficiency in service quality and even pose security challenges that can only be addressed by the use of parallel ...
+16 more
core +3 more sources
Committing to information is a central task in cryptography, where a party (typically called a prover) stores a piece of information (e.g., a bit string) with the promise of not changing it.
Lijie Chen, Ramis Movassagh
doaj +1 more source
Efficient asynchronous accumulators for distributed PKI [PDF]
Cryptographic accumulators are a tool for compact set representation and secure set membership proofs. When an element is added to a set by means of an accumulator, a membership witness is generated. This witness can later be used to prove the membership
Yakoubov, Sophia
core +2 more sources
Score-Guided Structural Equation Model Trees
Structural equation model (SEM) trees are data-driven tools for finding variables that predict group differences in SEM parameters. SEM trees build upon the decision tree paradigm by growing tree structures that divide a data set recursively into ...
Manuel Arnold +4 more
doaj +1 more source
Efficient verification of parallel matrix multiplication in public cloud: the MapReduce case
With the advent of cloud-based parallel processing techniques, services such as MapReduce have been considered by many businesses and researchers for different applications of big data computation including matrix multiplication, which has drawn much ...
Ramtin Bagheri +2 more
doaj +1 more source
Overcoming Data Availability Attacks in Blockchain Systems: Short Code-Length LDPC Code Design for Coded Merkle Tree [PDF]
Light nodes in blockchains improve the scalability of the system by storing a small portion of the blockchain ledger. In certain blockchains, light nodes are vulnerable to a data availability (DA) attack where a malicious node makes the light nodes ...
Debarnab Mitra, Lev Tauz, L. Dolecek
semanticscholar +1 more source
ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging [PDF]
The social demand for email end-to-end encryption is barely supported by mainstream service providers. Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand.
Chor Benny +13 more
core +2 more sources
MT-SOTA: A Merkle-Tree-Based Approach for Secure Software Updates over the Air in Automotive Systems
The automotive industry has seen a dynamic transformation from traditional hardware-defined to software-defined architecture enabling higher levels of autonomy and connectivity, better safety and security features, as well as new in-vehicle experiences ...
Abir Bazzi, A. Shaout, Di Ma
semanticscholar +1 more source
Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core +1 more source
Indexing structures for the PLS blockchain
This paper studies known indexing structures from a new point of view: minimisation of data exchange between an IoT device acting as a blockchain client and the blockchain server running a protocol suite that includes two Guy Fawkes protocols, PLS and ...
Alex Shafarenko
doaj +1 more source

