Results 81 to 90 of about 63,410 (288)
Key derivation function: key-hash based computational extractor and stream based pseudorandom expander [PDF]
The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys.
Chai Wen Chuah +2 more
doaj +2 more sources
The Myth of Superiority of American Encryption Products [PDF]
Encryption software and hardware use sophisticated mathematical algorithms to encipher a message so that only the intended recipient may read it. Fearing that criminals and terrorists will use encryption to evade authorities, the United States now ...
Henry B. Wolfe
core
A Scoping Review of Nudges for Enhancing Agricultural Policy
ABSTRACT Following PRISMA guidelines, we conduct a scoping review on 18 empirical studies on nudging interventions for farmers in Europe and the USA. The evidence on the effectiveness of nudges is mixed. Some studies demonstrate positive outcomes, particularly when nudges are combined with other interventions; others report no effect or negative ...
Nadja El Benni +4 more
wiley +1 more source
Comprehensive Analysis of Cryptographic Algorithms: Implementation and Security Insights
This study surveys some cryptographic algorithms in a detailed manner; it mainly focuses on symmetric key cryptography and asymmetric key cryptography with hash functions following them.
Rashid Muhenga +4 more
doaj +1 more source
Do Consumers Value Diversity in Agriculture? A Choice Experiment
ABSTRACT Farm ownership in the US today is racially and ethnically homogeneous. Diverse farmers and ranchers make up less than 10% of all producers, they tend to be less financially stable and have tighter profit margins. In the past few years, both government and industry programs have aimed to increase the participation and profitability of diverse ...
Maria Kalaitzandonakes +2 more
wiley +1 more source
Changes in Alcohol Retail Laws and Foot Traffic at Liquor Stores
ABSTRACT We study how expanding alcohol availability at grocery and convenience stores affects consumer traffic in liquor stores by leveraging recent changes in state‐level alcohol distribution laws in a difference‐in‐difference quasi‐experimental design.
Nathan Palardy +3 more
wiley +1 more source
Feasibility of Quantum Key Distribution Between Supersonic Aircraft
Quantum key distribution (QKD) leverages the laws of quantum mechanics to enable the secure transfer of information and is the only known method of key exchange capable of providing verifiable security.
Solomon Raphael McKiernan +1 more
doaj +1 more source
Hydrogen‐powered aviation offers a transformative pathway to zero‐emission flight by eliminating in‐flight CO2 emissions. Key considerations include propulsion systems (fuel cells and hydrogen combustion), cryogenic storage and insulation challenges, infrastructure and cost barriers, and supply‐chain constraints.
Mubasshira +4 more
wiley +1 more source
Abstract The Russian invasion of Ukraine in February 2022 had profound consequences for the global economy. As both countries are major commodity exporters, the food value chain was also affected. This study investigates the impact of the invasion on stock prices, profitability and sentiments of agribusinesses along the food supply chain by using an ...
Julia Höhler +2 more
wiley +1 more source
CASDC: A Cryptographically Secure Data System Based on Two Private Key Images [PDF]
Mua’ad Abu-Faraj +4 more
openalex +1 more source

