Results 161 to 170 of about 18,375 (213)

Implementation of a novel secured authentication protocol for cyber security applications. [PDF]

open access: yesSci Rep
Suresh Kumar V   +7 more
europepmc   +1 more source

Time trends in newly recorded diagnoses of 19 long term conditions before, during, and after the covid-19 pandemic: population based cohort study in England using OpenSAFELY.

open access: yesBMJ
Russell MD   +23 more
europepmc   +1 more source

txci-ATAC-seq: a massive-scale single-cell technique to profile chromatin accessibility. [PDF]

open access: yesGenome Biol
Zhang H   +8 more
europepmc   +1 more source

Quantum hashing via ∈-universal hashing constructions and classical fingerprinting

Lobachevskii Journal of Mathematics, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ablayev F., Ablayev M.
openaire   +3 more sources

Energy Scalable Universal Hashing

IEEE Transactions on Computers, 2005
Message authentication codes (MACs) are valuable tools for ensuring the integrity of messages. MACs may be built around a universal hash function (NH) which was explored in the construction of UMAC. In this paper, we use a variation on NH called WH. WH reaches optimally in the sense that it is universal with half the hash length of NH and it achieves ...
J. Kaps, K. Yuksel, B. Sunar
openaire   +1 more source

Home - About - Disclaimer - Privacy