Results 1 to 10 of about 244,652 (251)

Finnsheep and their utilization in crosses with the Merino under range conditions of South-Africa

open access: yesAgricultural and Food Science, 1988
Two field trials were performed at two localities in a semiarid region to evaluate the performance of Finn (F) x Merino(M) crossbred females. The trials involved 781 F x M ewes and 657 M ewes. Ile de France, S.A. Mutton Merino, Dohne Merino, M, and F x M
J. C. Greeff, J. H. Hofmeyr
doaj  

Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods

open access: yesJournal of Mathematical Cryptology, 2021
Extra-reductions occurring in Montgomery multiplications disclose side-channel information which can be exploited even in stringent contexts. In this article, we derive stochastic attacks to defeat Rivest-Shamir-Adleman (RSA) with Montgomery ladder ...
Dugardin Margaux   +2 more
doaj   +1 more source

The levels of information objectification in the context of legal protection ability

open access: yesRUDN Journal of Law, 2023
The subject of the study is the essential content and interpretation of the essence of “information”, its symbolic metaphysics. The emphasis is on the sign-symbolic level of perception of information, as well as its meaning (significance) of the sequence
Stanislav V. Odintsov   +1 more
doaj   +1 more source

Certifying RSA public keys with an efficient NIZK [PDF]

open access: yes, 2018
In many applications, it is important to verify that an RSA public key ( N,e ) specifies a permutation, in order to prevent attacks due to adversarially-generated public keys.
Balditimsi, Foteini   +3 more
core  

Scaling behavior of jamming fluctuations upon random sequential adsorption

open access: yes, 2003
It is shown that the fluctuations of the jamming coverage upon Random Sequential Adsorption ($\sigma_{\theta_J}$), decay with the lattice size according to the power-law $\sigma_{\theta_J} \propto L^{-1 / \nu_J}$, with $\nu_{J} = 2 / (2D - d_f)$, where ...
Albano, Ezequiel V.   +2 more
core   +2 more sources

Implementation of QR Code Attendance Security System Using RSA and Hash Algorithms

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi
The quick response (QR) code-based attendance application contributes to reducing paper usage and attendance input errors. However, in its implementation process, the QR-code-based attendance at a Bandung school demonstrates weaknesses.
Arif Indra Irawan   +3 more
doaj   +1 more source

An Analysis of the Effectiveness of Understudy Programs: The Case of the Roads Authority Namibia

open access: yesManagement Dynamics in the Knowledge Economy, 2019
There is a lack of effective, comprehensive understudy training programs in the Roads Authority (RA) of Namibia, compounded by a lack of monitoring and evaluation mechanisms of such programs.
Kasika Chalwa Gladys   +1 more
doaj   +1 more source

Random packing of spheres in Menger sponge

open access: yes, 2013
Random packing of spheres inside fractal collectors of dimension 2 < d < 3 is studied numerically using Random Sequential Adsorption (RSA) algorithm. The paper focuses mainly on the measurement of random packing saturation limit.
Adamczyk Z.   +6 more
core   +1 more source

Adaptive Steganography Using Improve Bit-plane Complexity Segmentation [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics
One of the primary challenges in Internet data transmission lies in safeguarding data from unauthorized access by potential attackers. The goal of content-adaptive steganography is to conceal data inside the image's intricate texture.
Noor Gassan Abdullah   +1 more
doaj   +1 more source

An efficient and secure RSA--like cryptosystem exploiting R\'edei rational functions over conics

open access: yes, 2016
We define an isomorphism between the group of points of a conic and the set of integers modulo a prime equipped with a non-standard product. This product can be efficiently evaluated through the use of R\'edei rational functions.
Bellini, Emanuele, Murru, Nadir
core  

Home - About - Disclaimer - Privacy