Results 51 to 60 of about 1,098,148 (248)

COST BENEFIT ANALYSIS OF COMPROMISING LEDGER SYSTEM BASED ON BLOCKCHAIN TECHNOLOGY

open access: yesBizInfo, 2018
Modern application of the blockchain technology is the center of attention of technology and economy sectors. Proper usage of blockchain is based on peer to peer (P2P) network to coordinate a worldwide, universal ledger where all transactions on the ...
Edis Mekić   +2 more
doaj   +1 more source

On perfect hashing of numbers with sparse digit representation via multiplication by a constant [PDF]

open access: yes, 2011
Consider the set of vectors over a field having non-zero coefficients only in a fixed sparse set and multiplication defined by convolution, or the set of integers having non-zero digits (in some base $b$) in a fixed sparse set.
Monge, Maurizio
core   +2 more sources

Universal hashing and authentication codes [PDF]

open access: yesDesigns, Codes and Cryptography, 1994
In this paper, we study the application of universal hashing to the construction of unconditionally secure authentication codes without secrecy. This idea is most useful when the number of authenticators is exponentially small compared to the number of possible source states (plaintext messages).
openaire   +3 more sources

Enhancing Extractable Quantum Entropy in Vacuum-Based Quantum Random Number Generator

open access: yesEntropy, 2018
Information-theoretically provable unique true random numbers, which cannot be correlated or controlled by an attacker, can be generated based on quantum measurement of vacuum state and universal-hashing randomness extraction.
Xiaomin Guo   +5 more
doaj   +1 more source

Topological Quantum Gate Construction by Iterative Pseudogroup Hashing

open access: yes, 2010
We describe the hashing technique to obtain a fast approximation of a target quantum gate in the unitary group SU(2) represented by a product of the elements of a universal basis.
Burrello, Michele   +2 more
core   +1 more source

Energy-efficient pipelined bloom filters for network intrusion detection [PDF]

open access: yes, 2006
This document is made available in accordance with publisher policies. Please cite only the published version using the reference above.
Kaya, I, Kocak, T
core   +2 more sources

Electronic records long term authenticity and integrity demonstration

open access: yesKnjižnica, 2011
Long term preservation of electronic data requires introduction of specific technology solutions and organizational measures in order to provide stable environment for electronic record preservation.
Helena Halas, Aljoša Jerman Blažič
doaj   +1 more source

Recursive n-gram hashing is pairwise independent, at best [PDF]

open access: yes, 2010
Many applications use sequences of n consecutive symbols (n-grams). Hashing these n-grams can be a performance bottleneck. For more speed, recursive hash families compute hash values by updating previous values.
Carter   +12 more
core   +2 more sources

Iceberg Hashing: Optimizing Many Hash-Table Criteria at Once [PDF]

open access: yesarXiv, 2021
Despite being one of the oldest data structures in computer science, hash tables continue to be the focus of a great deal of both theoretical and empirical research. A central reason for this is that many of the fundamental properties that one desires from a hash table are difficult to achieve simultaneously; thus many variants offering different trade-
arxiv  

AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Increasingly connectivity becomes integrated in products and devices that previously operated in a stand-alone setting. This observation holds for many consumer applications in the so-called "Internet of Things" (IoT) as well as for corresponding ...
Björn Haase, Benoît Labrique
doaj   +1 more source

Home - About - Disclaimer - Privacy