Results 51 to 60 of about 37,018 (310)
Direct Acyclic Graph based Ledger for Internet of Things: Performance and Security Analysis [PDF]
Direct Acyclic Graph (DAG)-based ledger and the corresponding consensus algorithm has been identified as a promising technology for Internet of Things (IoT).
Cao, Bin +6 more
core +2 more sources
Random Oracles in a Quantum World [PDF]
The interest in post-quantum cryptography - classical systems that remain secure in the presence of a quantum adversary - has generated elegant proposals for new cryptosystems.
C.H. Bennett +25 more
core +3 more sources
Associations of Sleep and Shift Work with Osteoarthritis Risk
Objective Daily rhythms may be critical for maintaining homeostasis of joint tissues. We aimed to investigate the relationships between circadian clock disruption, sleep, and osteoarthritis (OA) risk in humans. Methods In the UK Biobank, a prospective 500,000‐person cohort, we evaluated associations between sleep duration, sleeplessness/insomnia, and ...
Elizabeth L. Yanik +5 more
wiley +1 more source
Hashing technique based on SHA-3 using chaotic maps1
New hashing technique based on SHA-3 (Secure Hash Algorithm-3) is introduced. Chaotic maps are used in this technique to enhance performance without losing security.
A. V. Sidorenko, M. S. Shishko
doaj +1 more source
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area [PDF]
Secure data transfer has been the most challenging task for Internet of Things (IoT) devices. Data integrity must be ensured before and after the data transmission.
Lim , Yen Ruen
core
The highly anisotropic Fermi surface of bismuth results in variations in magnetotransport properties across different crystallographic directions, which can be characterized by studying microcrystals. To avoid the observed surface melting under room temperature Focused Ion Beam (FIB) irradiation, two low‐temperature FIB fabrication methods are proposed
Amaia Sáenz‐Hernández +6 more
wiley +1 more source
xxxx. ABSTRACT Glioblastoma (GBM) remains one of the most lethal brain cancers, with median survival rarely exceeding 15 months after diagnosis. Interleukin‐12 (IL‐12) is a potent immunostimulatory cytokine capable of reshaping the tumor microenvironment (TME), yet its clinical translation is hindered by systemic toxicity and short half‐life. RNA‐based
Fatima Hameedat +11 more
wiley +1 more source
Improved Preimage Attacks on 3-Round Keccak-224/256
In this paper, we provide an improved method on preimage attacks of standard 3-round Keccak-224/256. Our method is based on the work by Li and Sun. Their strategy is to find a 2-block preimage instead of a 1-block one by constructing the first and second
Xiaoen Lin, Le He, Hongbo Yu
doaj +1 more source
Implementation of cryptographic primitives [PDF]
Tato semestrální práce je zaměřena na kryptografické metody. Část se věnuje blokovým šifrám, kde popisuje algoritmy Blowfish a 3DES. Dále se zabývá hashovacími funkcemi, z nich podrobně rozebírá algoritmy SHA-3 a Tiger.This semestral thesis is focused on
Jégrová, Eliška
core
Geometrically Tunable Scaffold‐Free Muscle Bioconstructs for Treating Volumetric Muscle Loss
Volumetric muscle loss is associated with traumatic muscle resulting in permanent functional impairment. Mold‐based, scaffold‐free, high‐density muscle tissue bioconstructs are developed in customizable geometric shapes and sizes. The transplanted rectangular solid‐shaped muscle bioconstructs improved muscle force recovery and tissue regeneration in ...
Bugra Ayan +8 more
wiley +1 more source

