Results 51 to 60 of about 106,354 (248)
Security of signed ELGamal encryption [PDF]
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against the adaptive chosen ciphertext attack, in which an attacker can freely use
Jakobsson, Markus, Schnorr, Claus Peter
core
Aim A prior non‐randomized study suggests that potassium supplementation may improve survival among furosemide initiators, and a randomized trial suggests that salt substitutes containing potassium might lower stroke risk. We conducted a retrospective cohort study using health‐care data to confirm or refute these associations among new users of ...
Thanh Phuong Pham Nguyen +8 more
wiley +1 more source
Provably Secure Covert Communication on Blockchain
Blockchain is a public open ledger that provides data integrity in a distributed manner. It is the underlying technology of cryptocurrencies and an increasing number of related applications, such as smart contracts. The open nature of blockchain together
Juha Partala
doaj +1 more source
Machine‐learning potentials are increasingly taking on the exploratory tasks of homogeneous catalysis, enabling rapid conformer sampling and reaction‐space mapping. However, when selectivity depends on subtle electronic effects, electronic‐structure methods remain essential.
Maxime Ferrer +3 more
wiley +1 more source
Efficient and provably-secure certificateless sequential aggregate signature scheme
Aiming at the problem that current schemes mostly let the latter signer to verify the multiple signatures of the previous signer, and the message is signed and then passed to the next signer, leading to the efficiency problem of long overall signature ...
Zhu WANG +5 more
doaj
Schematic representation of artificial intelligence approaches in enzyme catalysis, integrating bibliometric analysis, emerging research trends, and machine learning tools for enzyme design, prediction, and industrial biocatalytic applications. Abstract This study systematically explores the applications of artificial intelligence (AI) in enzyme ...
Misael Bessa Sales +6 more
wiley +1 more source
Improved Scheme for Data Aggregation of Distributed Oracle for Intelligent Internet of Things
Oracle is a data supply mechanism that provides real-world data for blockchain. It serves as a bridge between blockchain and the IoT world, playing a crucial role in solving problems such as data sharing and device management in the IoT field.
Ruiyang Gao +5 more
doaj +1 more source
Blockchain Certificateless Encryption Mechanism Based on National Secret Algorithm [PDF]
The blockchain has attracted widespread attention because of its distributed,non-tamperable and inherent immutability features.However,the international cryptographic algorithm used in the blockchain has certain backdoor security risks.Based on the ...
XIANG Yanjie, HUANG Xiaofang, XIANG Kefeng, ZHENG Ji’nan
doaj +1 more source
Revocable Certificateless Public Key Encryption With Outsourced Semi-Trusted Cloud Revocation Agent
Certificateless public key cryptography (CL-PKC) not only eliminates the need for certificates in traditional certificate-based PKC but also solves the inherent key escrow problem in identity-based PKC.
Mingxin Ma +4 more
doaj +1 more source
Partial identification with categorical data and nonignorable missing outcomes
Abstract Nonignorable missing outcomes are common in real‐world datasets and often require strong parametric assumptions to achieve identification. These assumptions can be implausible or untestable, and so we may wish to forgo them in favour of partially identified models that narrow the set of a priori possible values to an identification region.
Daniel Daly‐Grafstein, Paul Gustafson
wiley +1 more source

