Results 61 to 70 of about 16,729,036 (330)
ABSTRACT Background Despite their increased risk for functional impairment resulting from cancer and its treatments, few adolescents and young adults (AYAs) with a hematological malignancy receive the recommended or therapeutic dose of exercise per week during inpatient hospitalizations.
Jennifer A. Kelleher +8 more
wiley +1 more source
Blind Proxy Re-Signature Scheme Based on Isomorphisms of Polynomials
Most of the existing blind proxy re-signature schemes are designed based on the traditional public key cryptosystems, whose security relies on the hardness of big integer factoring, discrete logarithm, elliptic curve discrete logarithm, and so on ...
Li Huixian +3 more
doaj +1 more source
Yao’s millionaires’ problem and public-key encryption without computational assumptions
We offer efficient and practical solutions of Yao’s millionaires’ problem without using any one-way functions. Some of the solutions involve physical principles, while others are purely mathematical.
Grigoriev, D., Kish, L., Shpilrain, V.
core +2 more sources
Will quantum computers be the end of public key encryption?
The emergence of practical quantum computers poses a significant threat to the most popular public key cryptographic schemes in current use. While we know that the well-understood algorithms for factoring large composites and solving the discrete ...
W. Buchanan, Alan Woodward
semanticscholar +1 more source
Server-Aided Public Key Encryption With Keyword Search
Public key encryption with keyword search (PEKS) is a well-known cryptographic primitive for secure searchable data encryption in cloud storage. Unfortunately, it is inherently subject to the (inside) offline keyword guessing attack (KGA), which is ...
Rongmao Chen +6 more
semanticscholar +1 more source
Quantum walks public key cryptographic system [PDF]
Quantum Cryptography is a rapidly developing field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information
Chrysoula Vlachou +4 more
semanticscholar +1 more source
ABSTRACT Background Psychological safety (PS) is essential for teamwork, communication, and patient safety in complex healthcare environments. In pediatric oncology, interprofessional collaboration occurs under high emotional and organizational demands. Low PS may increase stress, burnout, and adverse events.
Alexandros Rahn +4 more
wiley +1 more source
ABSTRACT Background Chronic kidney disease is a growing public health problem worldwide, and the number of patients requiring renal replacement therapy is steadily increasing. Türkiye has experienced a similar rise in both the incidence and prevalence of renal replacement therapy over the past decades; however, national‐level projections of future ...
Arzu Akgül +2 more
wiley +1 more source
Symbolic Plithogenic Numbers in RSA Cryptography: A Path to Post-Quantum Security
The RSA algorithm, with its strong mathematical foundation rooted in number theory and its wide range of applications in secure communication, is one of the most widely used public-key encryption methods.
Mehmet Merkepci +2 more
doaj +1 more source
Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage
In the past, the security of most public-key encryption or key encapsulation schemes is shown in an ideal model, where private keys, secret keys and random values are assumed to be absolutely secure to adversaries.
Jui-Di Wu +3 more
doaj +1 more source

