Results 21 to 30 of about 397,696 (287)

Verification of Implementations of Cryptographic Hash Functions

open access: yesIEEE Access, 2017
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang   +5 more
doaj   +1 more source

Comparative Study of Keccak SHA-3 Implementations

open access: yesCryptography, 2023
This paper conducts an extensive comparative study of state-of-the-art solutions for implementing the SHA-3 hash function. SHA-3, a pivotal component in modern cryptography, has spawned numerous implementations across diverse platforms and technologies ...
Alessandra Dolmeta   +2 more
doaj   +1 more source

Analytic calculations and synthetic shapes for validation of quantitative contour comparison software

open access: yesPhysics and Imaging in Radiation Oncology, 2023
A high level of variability in reported values was observed in a recent survey of contour similarity measures (CSMs) calculation tools. Such variations in the output measurements prevent meaningful comparison between studies.
Djamal Boukerroui   +3 more
doaj   +1 more source

A Review of Watershed Implementations for Segmentation of Volumetric Images

open access: yesJournal of Imaging, 2022
Watershed is a widely used image segmentation algorithm. Most researchers understand just an idea of this method: a grayscale image is considered as topographic relief, which is flooded from initial basins.
Anton Kornilov   +2 more
doaj   +1 more source

Fast Software Polar Decoders [PDF]

open access: yes, 2014
Among error-correcting codes, polar codes are the first to provably achieve channel capacity with an explicit construction. In this work, we present software implementations of a polar decoder that leverage the capabilities of modern general-purpose ...
Giard, Pascal   +3 more
core   +1 more source

Ward's Hierarchical Clustering Method: Clustering Criterion and Agglomerative Algorithm [PDF]

open access: yes, 2011
The Ward error sum of squares hierarchical clustering method has been very widely used since its first description by Ward in a 1963 publication. It has also been generalized in various ways.
AK JAIN   +22 more
core   +2 more sources

Goal-Oriented Software Design Reviews

open access: yesIEEE Access, 2022
Some software requirements are omitted or ambiguous depending on the design context, although these requirements would not necessarily be omitted or ambiguous when viewed as requirements alone.
Michiyo Wakimoto, Shuji Morisaki
doaj   +1 more source

Faster Base64 Encoding and Decoding Using AVX2 Instructions [PDF]

open access: yes, 2018
Web developers use base64 formats to include images, fonts, sounds and other resources directly inside HTML, JavaScript, JSON and XML files. We estimate that billions of base64 messages are decoded every day. We are motivated to improve the efficiency of
Lemire, Daniel, Muła, Wojciech
core   +2 more sources

FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Fault injection attacks are one of the most powerful forms of cryptanalytic attacks on ciphers. A single, precisely injected fault during the execution of a cipher like the AES, can completely reveal the key within a few milliseconds.
Keerthi K   +4 more
doaj   +1 more source

Serial and Parallel Implementations of Hybrid Fluid Model of Information Flows in Networks with Complex Topology

open access: yesITM Web of Conferences, 2017
This paper is dedicated to the issue of modeling information flows in networks with complex topologies and it describes a comparison of the sequential (written in the MATLAB language) and parallel (based on GPGPU technology) software implementations of ...
Basavin Dmitry, Porshnev Sergey
doaj   +1 more source

Home - About - Disclaimer - Privacy