Results 21 to 30 of about 397,696 (287)
Verification of Implementations of Cryptographic Hash Functions
Cryptographic hash functions have become the basis of modern network computing for identity authorization and secure computing; protocol consistency of cryptographic hash functions is one of the most important properties that affect the security and ...
Dexi Wang +5 more
doaj +1 more source
Comparative Study of Keccak SHA-3 Implementations
This paper conducts an extensive comparative study of state-of-the-art solutions for implementing the SHA-3 hash function. SHA-3, a pivotal component in modern cryptography, has spawned numerous implementations across diverse platforms and technologies ...
Alessandra Dolmeta +2 more
doaj +1 more source
A high level of variability in reported values was observed in a recent survey of contour similarity measures (CSMs) calculation tools. Such variations in the output measurements prevent meaningful comparison between studies.
Djamal Boukerroui +3 more
doaj +1 more source
A Review of Watershed Implementations for Segmentation of Volumetric Images
Watershed is a widely used image segmentation algorithm. Most researchers understand just an idea of this method: a grayscale image is considered as topographic relief, which is flooded from initial basins.
Anton Kornilov +2 more
doaj +1 more source
Fast Software Polar Decoders [PDF]
Among error-correcting codes, polar codes are the first to provably achieve channel capacity with an explicit construction. In this work, we present software implementations of a polar decoder that leverage the capabilities of modern general-purpose ...
Giard, Pascal +3 more
core +1 more source
Ward's Hierarchical Clustering Method: Clustering Criterion and Agglomerative Algorithm [PDF]
The Ward error sum of squares hierarchical clustering method has been very widely used since its first description by Ward in a 1963 publication. It has also been generalized in various ways.
AK JAIN +22 more
core +2 more sources
Goal-Oriented Software Design Reviews
Some software requirements are omitted or ambiguous depending on the design context, although these requirements would not necessarily be omitted or ambiguous when viewed as requirements alone.
Michiyo Wakimoto, Shuji Morisaki
doaj +1 more source
Faster Base64 Encoding and Decoding Using AVX2 Instructions [PDF]
Web developers use base64 formats to include images, fonts, sounds and other resources directly inside HTML, JavaScript, JSON and XML files. We estimate that billions of base64 messages are decoded every day. We are motivated to improve the efficiency of
Lemire, Daniel, Muła, Wojciech
core +2 more sources
Fault injection attacks are one of the most powerful forms of cryptanalytic attacks on ciphers. A single, precisely injected fault during the execution of a cipher like the AES, can completely reveal the key within a few milliseconds.
Keerthi K +4 more
doaj +1 more source
This paper is dedicated to the issue of modeling information flows in networks with complex topologies and it describes a comparison of the sequential (written in the MATLAB language) and parallel (based on GPGPU technology) software implementations of ...
Basavin Dmitry, Porshnev Sergey
doaj +1 more source

