Results 51 to 60 of about 4,920 (187)

On stabilizers in finite permutation groups

open access: yesBulletin of the London Mathematical Society, Volume 58, Issue 1, January 2026.
Abstract Let G$G$ be a permutation group on the finite set Ω$\Omega$. We prove various results about partitions of Ω$\Omega$ whose stabilizers have good properties. In particular, in every solvable permutation group there is a set‐stabilizer whose orbits have length at most 6, which is best possible and answers two questions of Babai.
Luca Sabatini
wiley   +1 more source

Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding

open access: yesTongxin xuebao, 2014
The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented.
Gao-li WANG, Yan-zhao SHEN
doaj   +2 more sources

Blockweave: An Arweave‐Based Decentralized Storage Solution to Tackle the Blockchain Trilemma

open access: yesEngineering Reports, Volume 7, Issue 7, July 2025.
Leveraging Arweave's blockweave and Proof‐of‐Access consensus, this framework reduces on‐chain metadata to 48 bytes, enabling throughput up to 7200 TPS, 99%$$ 99\% $$ storage savings, and robust security (Q(0.4)=0.82)$$ \left(\mathrm{Q}(0.4)=0.82\right) $$ while achieving Tier‐S decentralization on $300 mining nodes.
Saha Reno, Koushik Roy, Tamanna Tabassum
wiley   +1 more source

Constructing Efficient Identity‐Based Signatures on Lattices

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
In this work, we explore the recent developments related to lattice‐based signature and preimage sampling, and specify a compact identity‐based signature (IBS) on an ideal lattice for practical use. Specifically, we first propose an ellipsoid version of the G + G signature scheme (Asiacrypt 2023) that achieves slightly better signature size and higher ...
Huiwen Jia   +4 more
wiley   +1 more source

Characterizing the Shape of Activation Space in Deep Neural Networks

open access: yes, 2019
The representations learned by deep neural networks are difficult to interpret in part due to their large parameter space and the complexities introduced by their multi-layer structure.
Gebhart, Thomas   +2 more
core   +1 more source

Enhancing Medical Images Security and Efficiency With Adaptive Compressed Sensing and SHA‐3 in Telemedicine

open access: yesInternational Journal of Biomedical Imaging, Volume 2025, Issue 1, 2025.
Security issues of telemedicine‐based secure transmission of medical images find a very thin line drawn between diagnostic acceptability and cybersecurity. Partial but imperfect solutions emerge. JPEG2000 and HEVC concentrate only on compression, failing to provide any security consideration.
Ashraf Al Sharah   +7 more
wiley   +1 more source

Integrity verification for digital Holy Quran verses using cryptographic hash function and compression

open access: yesJournal of King Saud University: Computer and Information Sciences, 2020
Data Integrity is one of the primary concepts in information security. The main task of the cryptographic hash function is to assure the integrity of the transmitted data.
Mishal Almazrooie   +5 more
doaj   +1 more source

ArtProtect: Blockchain and NFC‐based anti‐counterfeit system for physical art

open access: yesIET Blockchain, Volume 4, Issue 4, Page 423-442, December 2024.
An anti‐counterfeiting system for physical art based on Ethereum blockchain and near‐field communication technology is proposed and implemented. The system leverages the use of Ethereum smart contracts and inter‐planetary file system to store artworks’ certificate of authenticity, and display them in a mobile app called ArtProtect.
Cindy Handoko Tantowibowo   +1 more
wiley   +1 more source

A second preimage attack on zipper hash

open access: yesSecurity and Communication Networks, 2015
AbstractThe zipper hash utilizes two‐pass hashing to strengthen the iterated hash functions against the generic attack. In this paper, we analyze the features of zipper hash and several existing generic attacks on hash functions. A new tree structure called inverse‐diamond, which starts from one fixed point and ends with many points, is exploited to ...
Shiwei Chen, Chenhui Jin
openaire   +1 more source

Systematic review: Comparing zk‐SNARK, zk‐STARK, and bulletproof protocols for privacy‐preserving authentication

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 5, September/October 2024.
Abstract This systematic literature review examines the implementation and analysis of zk‐SNARK, zk‐STARK, and bulletproof non‐interactive zero‐knowledge proof (NIZKP) protocols in privacy‐preserving applications across diverse sectors. Examining 41 research works obtained through the systematic search queries and filtering criteria published from 2015
Bjorn Oude Roelink   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy