Results 111 to 120 of about 32,391 (267)

Improved homomorphic evaluation for hash function based on TFHE

open access: yesCybersecurity
Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic encryption. The earliest attempt to achieve homomorphic evaluation of SHA-256 hash function was proposed by Mella ...
Benqiang Wei, Xianhui Lu
doaj   +1 more source

Optimization of cut‐hole layout under high in situ stress based on numerical simulation and field tests

open access: yesDeep Underground Science and Engineering, EarlyView.
This study investigates the blast‐induced rock damage patterns under different cut‐hole layouts and ground stress conditions through numerical simulations and field tests. The findings in this study provide valuable insights for similar underground engineering applications.
Junjie Zhao   +5 more
wiley   +1 more source

Machine learning‐based prediction of elevated N terminal pro brain natriuretic peptide among US general population

open access: yesESC Heart Failure, Volume 12, Issue 2, Page 859-868, April 2025.
Abstract Aims Natriuretic peptide‐based pre‐heart failure screening has been proposed in recent guidelines. However, an effective strategy to identify screening targets from the general population, more than half of which are at risk for heart failure or pre‐heart failure, has not been well established.
Yuichiro Mori   +5 more
wiley   +1 more source

Year 2010 Issues on Cryptographic Algorithms [PDF]

open access: yes
In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions.
Masashi Une, Masayuki Kanda
core  

Post-Quantum Cryptography Anonymous Scheme -- PQCWC: Post-Quantum Cryptography Winternitz-Chen [PDF]

open access: yesarXiv
As quantum computing technology matures, it poses a threat to the security of mainstream asymmetric cryptographic methods. In response, the National Institute of Standards and Technology released the final version of post-quantum cryptographic (PQC) algorithm standards in August 2024.
arxiv  

Re‐Examining Buchel et al.’s (2021) Test of the Status Legitimacy Hypothesis

open access: yesEuropean Journal of Social Psychology, EarlyView.
ABSTRACT The status‐legitimacy hypothesis posits that low‐status groups more strongly endorse social hierarchies and disadvantageous systems (i.e., engage in system justification), particularly under extreme societal inequality. Buchel et al. (2021) found supportive evidence for this hypothesis based on a 28‐nation survey (N = 48,802).
Chuma Kevin Owuamalam   +7 more
wiley   +1 more source

Hardware-based Security for Virtual Trusted Platform Modules

open access: yes, 2013
Virtual Trusted Platform modules (TPMs) were proposed as a software-based alternative to the hardware-based TPMs to allow the use of their cryptographic functionalities in scenarios where multiple TPMs are required in a single platform, such as in ...
Alsouri, Sami   +3 more
core  

A single session of hyperbaric oxygen therapy demonstrates acute and long-lasting neuroplasticity effects in humans: a replicated, randomized controlled clinical trial

open access: yesJournal of Pain Research, 2019
Anna M Wahl,1 Daniel Bidstrup,1 Isabel G Smidt-Nielsen,1 Mads U Werner,2 Ole Hyldegaard,1,3 Per Rotbøll-Nielsen21Hyperbaric Unit, Department of Anesthesia, Head and Orthopedic Center, Rigshospitalet, Copenhagen University Hospitals, Copenhagen ...
Wahl AM   +5 more
doaj  

Assessing the Impact of Artificial Intelligence and Green Finance on Energy Efficiency: Based on Super‐Efficiency SBM and Tobit Two‐Stage Models

open access: yesEnergy Science &Engineering, EarlyView.
Conceptual framework. ABSTRACT To enhance energy efficiency (EE) and achieve sustainable development. This study measures EE through super‐efficiency SBM model, and verifies artificial intelligence (AI) and green finance (GF) impact on EE by Tobit model, conclusions as follows: (1) The EE of each region and the country is the spread of the low, with a ...
Hongji Zhou, Rong Wang
wiley   +1 more source

Home - About - Disclaimer - Privacy