Results 41 to 50 of about 6,908 (279)
Attacks on One Designated Verifier Proxy Signature Scheme
In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier.
Baoyuan Kang
doaj +1 more source
Certificateless signature scheme without random oracles
The security of certificateless signature schemes can be proved under the random oracle model.However,any implementation of the random oracle may result in insecure schemes.Some certificateless signature schemes without random oracles are not secure ...
Yan-qiong LI, Ji-guo LI, Yi-chen ZHANG
doaj +2 more sources
Oblivious Transfer Based on NTRUEncrypt
Oblivious transfer (OT) is the most fundamental process in cryptosystems and serves as the basic building block for implementing protocols, such as the secure multi-party computation and the fair electronic contract.
Bo Mi+4 more
doaj +1 more source
Relative to a random oracle, NP is not small
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kautz, Steven M., Miltersen, Peter Bro
openaire +4 more sources
Short‐term intravenous treatments with iPSC‐derived mononuclear phagocytes (iMPs) improve cognitive decline and neural health in two mouse models of aging and in the 5xFAD mouse model of Alzheimer's disease. iMPs reduce levels of serum amyloid proteins that increase in aging and improve the health of hippocampal microglia and mossy cells.
V. Alexandra Moser+11 more
wiley +1 more source
Query-Complexity Amplification for Random Oracles [PDF]
Increasing the computational complexity of evaluating a hash function, both for the honest users as well as for an adversary, is a useful technique employed for example in password-based cryptographic schemes to impede brute-force attacks, and also in so-called proofs of work (used in protocols like Bitcoin) to show that a certain amount of computation
Demay Grégory+3 more
openaire +3 more sources
RESP2, an enhanced antibody discovery pipeline for multi‐target and multi‐property optimization, identifies antibodies with optimized developability and broad affinity to multiple antigen variants. In silico evaluation shows RESP2 outperforms leading AI methods, achieving ≥85% success rates.
Jonathan Parkinson+3 more
wiley +1 more source
An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain
Identity-based cryptosystems mean that public keys can be directly derived from user identifiers, such as telephone numbers, email addresses, and social insurance number, and so on.
Qun Lin+5 more
doaj +1 more source
Abstract Futures markets are critical to price discovery and often dominate spot markets. We analyze the linkages between daily corn futures and spot prices in the United States using dynamic time warping. This nonparametric pattern recognition technique has several advantages over traditional time series methods.
Dragan Miljkovic+2 more
wiley +1 more source
Robust design of flexible supply chains with mobile and modular facilities
Abstract Modular manufacturing is increasingly being adopted by the chemical industry in applications where resource availability and product demand are highly distributed and uncertain. Modular plants are often built such that they can be easily relocated.
Congqin Ge, Zhihong Yuan, Qi Zhang
wiley +1 more source