Results 41 to 50 of about 451,593 (141)

Stegocrypt: A robust tri‐stage spatial steganography algorithm using TLM encryption and DNA coding for securing digital images

open access: yesIET Image Processing, Volume 18, Issue 13, Page 4189-4206, 13 November 2024.
This research work presents a novel secured spatial steganography algorithm consisting of three stages. In the first stage, a secret message is divided into three parts, each is encrypted using a tan logistic map encryption key with a unique seed value.
Wassim Alexan   +5 more
wiley   +1 more source

NeonCROSS: Vectorized Implementation of Post-Quantum Signature CROSS on Cortex-A72 and Apple M3

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
The advancement of quantum computing threatens traditional public-key cryptographic systems, prompting the development of post-quantum cryptography (PQC).
Hanyu Wei, Wenqian Li, Yunlei Zhao
doaj   +1 more source

Strong divisibility sequences and sieve methods

open access: yesMathematika, Volume 70, Issue 4, October 2024.
Abstract We investigate strong divisibility sequences and produce lower and upper bounds for the density of integers in the sequence that only have (somewhat) large prime factors. We focus on the special cases of Fibonacci numbers and elliptic divisibility sequences, discussing the limitations of our methods.
Tim Browning, Matteo Verzobio
wiley   +1 more source

Variational approaches to the elasticity of deformable strings with and without mass redistribution

open access: yesZAMM - Journal of Applied Mathematics and Mechanics / Zeitschrift für Angewandte Mathematik und Mechanik, Volume 104, Issue 8, August 2024.
Abstract The catenary is a curve that has played a significant role in the history of mathematics, finding applications in various disciplines such as mechanics, technology, architecture, the arts, and biology. In this paper, we introduce some generalizations by applying the variational method to deformable strings.
Stefano Giordano
wiley   +1 more source

Sampling and misspecification errors in the estimation of observation‐error covariance matrices using observation‐minus‐background and observation‐minus‐analysis statistics

open access: yesQuarterly Journal of the Royal Meteorological Society, Volume 150, Issue 762, Page 3052-3077, July 2024 Part A.
When estimating observation‐error covariance matrices using observation‐minus‐background and observation‐minus‐analysis residuals obtained from data assimilation systems, the error comes from two sources. The first is the indirect sampling error caused by using a finite sample of residual vectors, which depends largely on the ratio of vector size to ...
Guannan Hu, Sarah L. Dance
wiley   +1 more source

On the anti‐intercept features of noise radars

open access: yesIET Radar, Sonar &Navigation, Volume 18, Issue 7, Page 1014-1035, July 2024.
An evaluation of the related Low Probability of Detection, of Intercept and of Exploitation is presented for Continuous‐Emission Noise Radar waveforms with different operational parameters, that is, “tailored”, and with various “degrees of randomness”. The effect of “tailoring” is analysed with prospects for future work.
Gaspare Galati, Gabriele Pavan
wiley   +1 more source

mid-pSquare: Leveraging the Strong Side-Channel Security of Prime-Field Masking in Software

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Efficiently protecting embedded software implementations of standard symmetric cryptographic primitives against side-channel attacks has been shown to be a considerable challenge in practice.
Brieuc Balon   +5 more
doaj   +1 more source

Evaluation of an implementation intentions intervention for managing university student stress

open access: yesStress and Health, Volume 40, Issue 3, June 2024.
Abstract University students consistently report high levels of stress, which has been associated with a range of adverse outcomes. Promoting adaptive coping behaviours, such as problem‐focused coping for managing university stress, is therefore a timely area of investigation.
Leah J. Rackemann   +2 more
wiley   +1 more source

Applications of the Clifford torus to material textures

open access: yesJournal of Applied Crystallography, Volume 57, Issue 3, Page 638-648, June 2024.
A new 2D representation of 3D material textures based on the Clifford torus is presented.This paper introduces a new 2D representation of the orientation distribution function for an arbitrary material texture. The approach is based on the isometric square torus mapping of the Clifford torus, which allows for points on the unit quaternion hypersphere ...
Marc De Graef
wiley   +1 more source

Features of digital signal processing algorithms using Galois fields GF(2n+1). [PDF]

open access: yesPLoS One, 2023
Suleimenov IE   +2 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy