Results 101 to 110 of about 13,572 (291)
An efficient and secure RSA--like cryptosystem exploiting R\'edei rational functions over conics
We define an isomorphism between the group of points of a conic and the set of integers modulo a prime equipped with a non-standard product. This product can be efficiently evaluated through the use of R\'edei rational functions.
Bellini, Emanuele, Murru, Nadir
core
Multi-secret Visual Cryptography Scheme with Tag Information
Since that traditional tagged visual cryptography scheme (TVCS) can only hide only one secret image, this paper presents a multi-secret visual cryptography scheme with tag information. By adopting the concept of random grids (RG) to construct the basic share images of secret images and the tag images, and then combined them in the form of probability ...
Yan-yan HAN +3 more
openaire +2 more sources
Our study reveals that caving‐enhanced geothermal systems (C‐EGS) with adequately fractured reservoirs achieve optimal heat extraction by minimizing preferential flow paths, while conventional fracturing (F‐EGS) and pipe‐based (P‐EGS) systems suffer accelerated thermal drawdown.
Fangchao Kang +4 more
wiley +1 more source
Interference alignment based secure transmission scheme in multi-user interference networks
Faced with the requirement of information security in internet of things, a scenario of multi-user interference networks with multiple eavesdroppers was considered, and an interference alignment (IA) scheme based physical layer secure transmission was ...
Lin HU +4 more
doaj +2 more sources
Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate Quadratic Equations
In this paper, we investigate the security of Rainbow and Unbalanced Oil-and-Vinegar (UOV) signature schemes based on multivariate quadratic equations, which is one of the most promising alternatives for post-quantum signature schemes, against side ...
Aesun Park +3 more
doaj +1 more source
Verifiable multi-secret sharing based on LFSR sequences
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hu, Chunqiang +2 more
openaire +1 more source
An experimental device for physical simulation of hydraulic fracturing, comprising: a load‐bearing mechanism with multiple interconnected plates that collectively form an sample chamber; a load‐generating mechanisms, with multiple load‐generating mechanisms arranged within the experimental chamber.
Delei Shang +5 more
wiley +1 more source
This paper explores how climate‐resilient technologies, such as smart grids, digital twins, and self‐healing materials, can enhance urban resilience. It highlights the urgent need for proactive planning, public‐private collaboration, and data‐driven innovation to future‐proof underground infrastructure amid accelerating climate and urban pressures ...
Kai Chen Goh +12 more
wiley +1 more source
B1 is bord width 1, B2 is bord width 2, L is the pillar length, W is the pillar width, red color and letter A represent the pillars, and white color and number 1 represent excavated areas. Pstress is the average pillar stress; σv is the vertical component of the virgin stress, MPa; and e is the areal extraction ratio. e = B o B o + B P ${\rm{e}}=\frac{{
Tawanda Zvarivadza +4 more
wiley +1 more source
This review elucidates the velocity–dispersion–attenuation coupling mechanisms of wave propagation in rock masses, compares six representative models, and reveals how pressure, temperature, mineral composition, and anisotropy jointly control dynamic responses in complex geological media.
Jiajun Shu +8 more
wiley +1 more source

