Finnsheep and their utilization in crosses with the Merino under range conditions of South-Africa
Two field trials were performed at two localities in a semiarid region to evaluate the performance of Finn (F) x Merino(M) crossbred females. The trials involved 781 F x M ewes and 657 M ewes. Ile de France, S.A. Mutton Merino, Dohne Merino, M, and F x M
J. C. Greeff, J. H. Hofmeyr
doaj
Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods
Extra-reductions occurring in Montgomery multiplications disclose side-channel information which can be exploited even in stringent contexts. In this article, we derive stochastic attacks to defeat Rivest-Shamir-Adleman (RSA) with Montgomery ladder ...
Dugardin Margaux +2 more
doaj +1 more source
The levels of information objectification in the context of legal protection ability
The subject of the study is the essential content and interpretation of the essence of “information”, its symbolic metaphysics. The emphasis is on the sign-symbolic level of perception of information, as well as its meaning (significance) of the sequence
Stanislav V. Odintsov +1 more
doaj +1 more source
Certifying RSA public keys with an efficient NIZK [PDF]
In many applications, it is important to verify that an RSA public key ( N,e ) specifies a permutation, in order to prevent attacks due to adversarially-generated public keys.
Balditimsi, Foteini +3 more
core
Scaling behavior of jamming fluctuations upon random sequential adsorption
It is shown that the fluctuations of the jamming coverage upon Random Sequential Adsorption ($\sigma_{\theta_J}$), decay with the lattice size according to the power-law $\sigma_{\theta_J} \propto L^{-1 / \nu_J}$, with $\nu_{J} = 2 / (2D - d_f)$, where ...
Albano, Ezequiel V. +2 more
core +2 more sources
Implementation of QR Code Attendance Security System Using RSA and Hash Algorithms
The quick response (QR) code-based attendance application contributes to reducing paper usage and attendance input errors. However, in its implementation process, the QR-code-based attendance at a Bandung school demonstrates weaknesses.
Arif Indra Irawan +3 more
doaj +1 more source
An Analysis of the Effectiveness of Understudy Programs: The Case of the Roads Authority Namibia
There is a lack of effective, comprehensive understudy training programs in the Roads Authority (RA) of Namibia, compounded by a lack of monitoring and evaluation mechanisms of such programs.
Kasika Chalwa Gladys +1 more
doaj +1 more source
Random packing of spheres in Menger sponge
Random packing of spheres inside fractal collectors of dimension 2 < d < 3 is studied numerically using Random Sequential Adsorption (RSA) algorithm. The paper focuses mainly on the measurement of random packing saturation limit.
Adamczyk Z. +6 more
core +1 more source
Adaptive Steganography Using Improve Bit-plane Complexity Segmentation [PDF]
One of the primary challenges in Internet data transmission lies in safeguarding data from unauthorized access by potential attackers. The goal of content-adaptive steganography is to conceal data inside the image's intricate texture.
Noor Gassan Abdullah +1 more
doaj +1 more source
An efficient and secure RSA--like cryptosystem exploiting R\'edei rational functions over conics
We define an isomorphism between the group of points of a conic and the set of integers modulo a prime equipped with a non-standard product. This product can be efficiently evaluated through the use of R\'edei rational functions.
Bellini, Emanuele, Murru, Nadir
core

