Results 111 to 120 of about 32,391 (267)
Improved homomorphic evaluation for hash function based on TFHE
Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic encryption. The earliest attempt to achieve homomorphic evaluation of SHA-256 hash function was proposed by Mella ...
Benqiang Wei, Xianhui Lu
doaj +1 more source
This study investigates the blast‐induced rock damage patterns under different cut‐hole layouts and ground stress conditions through numerical simulations and field tests. The findings in this study provide valuable insights for similar underground engineering applications.
Junjie Zhao+5 more
wiley +1 more source
Abstract Aims Natriuretic peptide‐based pre‐heart failure screening has been proposed in recent guidelines. However, an effective strategy to identify screening targets from the general population, more than half of which are at risk for heart failure or pre‐heart failure, has not been well established.
Yuichiro Mori+5 more
wiley +1 more source
Year 2010 Issues on Cryptographic Algorithms [PDF]
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core
Post-Quantum Cryptography Anonymous Scheme -- PQCWC: Post-Quantum Cryptography Winternitz-Chen [PDF]
As quantum computing technology matures, it poses a threat to the security of mainstream asymmetric cryptographic methods. In response, the National Institute of Standards and Technology released the final version of post-quantum cryptographic (PQC) algorithm standards in August 2024.
arxiv
Non-trivial \Sha in the Jacobian of an infinite family of curves of genus 2 [PDF]
Anna Arnth-Jensen, E. V. Flynn
openalex +1 more source
Re‐Examining Buchel et al.’s (2021) Test of the Status Legitimacy Hypothesis
ABSTRACT The status‐legitimacy hypothesis posits that low‐status groups more strongly endorse social hierarchies and disadvantageous systems (i.e., engage in system justification), particularly under extreme societal inequality. Buchel et al. (2021) found supportive evidence for this hypothesis based on a 28‐nation survey (N = 48,802).
Chuma Kevin Owuamalam+7 more
wiley +1 more source
Hardware-based Security for Virtual Trusted Platform Modules
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in ...
Alsouri, Sami+3 more
core
Anna M Wahl,1 Daniel Bidstrup,1 Isabel G Smidt-Nielsen,1 Mads U Werner,2 Ole Hyldegaard,1,3 Per Rotbøll-Nielsen21Hyperbaric Unit, Department of Anesthesia, Head and Orthopedic Center, Rigshospitalet, Copenhagen University Hospitals, Copenhagen ...
Wahl AM+5 more
doaj
Conceptual framework. ABSTRACT To enhance energy efficiency (EE) and achieve sustainable development. This study measures EE through super‐efficiency SBM model, and verifies artificial intelligence (AI) and green finance (GF) impact on EE by Tobit model, conclusions as follows: (1) The EE of each region and the country is the spread of the low, with a ...
Hongji Zhou, Rong Wang
wiley +1 more source