Results 31 to 40 of about 3,272 (163)
Terdapat berbagai macam cara untuk melaksanakan ujian di tingkat perguruan tinggi, selama masa pandemi Covid-19 metode ujian online menjadi banyak digunakan.
Ferzha Putra Utama +3 more
doaj +3 more sources
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences
ZUC-256 is a stream cipher designed for 5G applications by the ZUC team. Together with AES-256 and SNOW-V, it is currently being under evaluation for standardized algorithms in 5G mobile telecommunications by Security Algorithms Group of Experts (SAGE).
Fukang Liu +5 more
doaj +1 more source
Three Fish Algorithm: T-Mix Cipher using SHA-256
In every organization, use of online services is increasing. With this the sensitive data is carried over internet on daily basis. Hence, there is a chance of misleading the data by unauthorized parties. So, there is need to provide security for that data and cryptography is the science that helps in providing security.
S. Shajarin +4 more
openaire +1 more source
Secure Medical Blockchain Model
The Internet of Medical Things (IoMT) uses wireless networks to help patients to communicate with healthcare professionals. Therefore, IoMT devices suffer from a lack of security controls, just like many Internet of Things (IoT) gadgets.
Ibrahim Shawky Farahat +4 more
doaj +1 more source
Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach
Cryptographic hash functions play a significant role in modern information security systems by ensuring data integrity and enabling efficient data compression. One of the most important and widely used cryptographic hash functions is SHA-256 that belongs
V. V. Davydov +3 more
doaj +1 more source
Miners' Reward Elasticity and Stability of Competing Proof‐of‐Work Cryptocurrencies
ABSTRACT Proof‐of‐Work cryptocurrencies employ miners to sustain the system through algorithmic reward adjustments. We develop a stochastic model of the multicurrency mining and identify conditions for stable transaction speeds. Bitcoin's algorithm requires hash supply elasticity <$<$1 for stability, while ASERT remains stable for any elasticity and ...
Kohei Kawaguchi +2 more
wiley +1 more source
A secure and efficient cryptographic hash function based on NewFORK-256
Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random number generation, for ensuring data
Harshvardhan Tiwari, Krishna Asawa
doaj +1 more source
Engineered surface strategies to manage dental implant‐related infections
Abstract When exposed to the oral environment, dental implants, like natural surfaces, become substrates for microbial adhesion and accumulation, often leading to implant‐related infections—one of the main causes of implant failure. These failures impose significant costs on patients, clinicians, and healthcare systems.
João Gabriel S. Souza +7 more
wiley +1 more source
Abstract Just Energy Transition Partnerships (JETPs) are novel financing mechanisms that encourage coal‐dependent emerging economies to transition away from fossil fuels. JETPs aim to facilitate coal phaseout and transitions to renewable energy through private and public financing.
Francine Hug
wiley +1 more source
Fast Implementation of SHA-3 in GPU Environment
Recently, Graphic Processing Units (GPUs) have been widely used for general purpose applications such as machine learning applications, acceleration of cryptographic applications (especially, blockchains), etc.
Hojin Choi, Seog Chung Seo
doaj +1 more source

