Results 111 to 120 of about 142,210 (279)
Privacy-Preserving Genetic Relatedness Test [PDF]
An increasing number of individuals are turning to Direct-To-Consumer (DTC) genetic testing to learn about their predisposition to diseases, traits, and/or ancestry. DTC companies like 23andme and Ancestry.com have started to offer popular and affordable
De Cristofaro, Emiliano+2 more
core +1 more source
Tightly-Secure Two-Tier Signatures on Code-Based Digital Signatures with Chameleon Hash Functions
In the current landscape where quantum algorithms pose a significant threat to conventional digital signature algorithms, code-based digital signature algorithms have emerged as the primary focus of ongoing research in post-quantum cryptography.
Yong Wang, Eddie Shahril Ismail
doaj +1 more source
Secure Hashing Algorithm And Advance Encryption Algorithm In Cloud Computing
Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common
openaire +2 more sources
Security of signed ELGamal encryption [PDF]
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against the adaptive chosen ciphertext attack, in which an attacker can freely use
Jakobsson, Markus, Schnorr, Claus Peter
core
Motivated by the problem of simultaneously preserving confidentiality and usability of data outsourced to third-party clouds, we present two different database encryption schemes that largely hide data but reveal enough information to support a wide ...
Basin D.+8 more
core +1 more source
Pydidas: a tool for automated X‐ray diffraction data analysis
Pydidas is a new Python package for processing X‐ray diffraction data, offering a user‐friendly interface and versatile processing options. It includes a graphical user interface for the entire data processing pipeline and is intended to be easily accessible for non‐experts.The processing and analysis of X‐ray diffraction (XRD) data at synchrotrons is ...
Malte Storm+2 more
wiley +1 more source
Abstract Disruptive coloration is one of the camouflaging strategies that use conspicuous coloration patterns to destroy the visual integrity of an object and interfere with the observer's visual perception. Such conspicuous coloration often divides the entire shape of the object into multiple areas, increasing the disruption effect. Here, we introduce
Masahiko Tanahashi+2 more
wiley +1 more source
Syrga2: Post-Quantum Hash-Based Signature Scheme
This paper proposes a new post-quantum signature scheme, Syrga2, based on hash functions. As known, existing post-quantum algorithms are classified based on their structures.
Kunbolat Algazy+3 more
doaj +1 more source
A fast portable implementation of the Secure Hash Algorithm, III. [PDF]
In 1992, NIST announced a proposed standard for a collision-free hash function. The algorithm for producing the hash value is known as the Secure Hash Algorithm (SHA), and the standard using the algorithm in known as the Secure Hash Standard (SHS).
openaire +3 more sources
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo+3 more
wiley +1 more source