Results 81 to 90 of about 61,999 (289)
Key derivation function: key-hash based computational extractor and stream based pseudorandom expander [PDF]
The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys.
Chai Wen Chuah +2 more
doaj +2 more sources
CASDC: A Cryptographically Secure Data System Based on Two Private Key Images [PDF]
Mua’ad Abu-Faraj +4 more
openalex +1 more source
With the help of large language models, deep neural network learning, and kinetic calculation, a knowledge graph prediction of prior research in methane conversion is conducted. This knowledge graph provides a comprehensive understanding of the relationships among catalyst materials, catalytic performance, and reaction conditions, providing guidance ...
Boyu Xu +11 more
wiley +1 more source
The Myth of Superiority of American Encryption Products [PDF]
Encryption software and hardware use sophisticated mathematical algorithms to encipher a message so that only the intended recipient may read it. Fearing that criminals and terrorists will use encryption to evade authorities, the United States now ...
Henry B. Wolfe
core
Comprehensive Analysis of Cryptographic Algorithms: Implementation and Security Insights
This study surveys some cryptographic algorithms in a detailed manner; it mainly focuses on symmetric key cryptography and asymmetric key cryptography with hash functions following them.
Rashid Muhenga +4 more
doaj +1 more source
We show that solutal Marangoni flows in thin films climbing the outer surfaces of hydrophilic obstacles break circular Belousov‐Zhabotinsky waves into striking flower‐like patterns. Evaporation‐driven surface‐tension gradients, coupled with gravity, trigger the instability; above a threshold, petal number scales linearly with obstacle diameter ...
Sangram Gore +9 more
wiley +1 more source
A Scoping Review of Nudges for Enhancing Agricultural Policy
ABSTRACT Following PRISMA guidelines, we conduct a scoping review on 18 empirical studies on nudging interventions for farmers in Europe and the USA. The evidence on the effectiveness of nudges is mixed. Some studies demonstrate positive outcomes, particularly when nudges are combined with other interventions; others report no effect or negative ...
Nadja El Benni +4 more
wiley +1 more source
Research on key management and authentication protocol of PDA in smart grid
According to PDA in smart grid, which faced with security issues, key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.
YU Xiao, TIAN Li, WANG Jie, LIU Zhe
doaj +3 more sources
Do Consumers Value Diversity in Agriculture? A Choice Experiment
ABSTRACT Farm ownership in the US today is racially and ethnically homogeneous. Diverse farmers and ranchers make up less than 10% of all producers, they tend to be less financially stable and have tighter profit margins. In the past few years, both government and industry programs have aimed to increase the participation and profitability of diverse ...
Maria Kalaitzandonakes +2 more
wiley +1 more source
Changes in Alcohol Retail Laws and Foot Traffic at Liquor Stores
ABSTRACT We study how expanding alcohol availability at grocery and convenience stores affects consumer traffic in liquor stores by leveraging recent changes in state‐level alcohol distribution laws in a difference‐in‐difference quasi‐experimental design.
Nathan Palardy +3 more
wiley +1 more source

