We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 411 results
  1. On cryptographic properties of cubic and splitting Boolean functions

    The weight, balancedness and nonlinearity are important properties of Boolean functions, but they can be difficult to determine in general. In this...

    Augustine Musukwa, Massimiliano Sala, ... Marco Zaninelli in Applicable Algebra in Engineering, Communication and Computing
    Article Open access 06 August 2022
  2. Twisted cubic and point-line incidence matrix in \(\mathrm {PG}(3,q)\)

    Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco in Designs, Codes and Cryptography
    Article 27 August 2021
  3. Hyper star structure connectivity of hierarchical folded cubic networks

    With the increasing popularity and diversity of network environments, it is crucial to assess the fault tolerance and stability of the network....

    Huimei Guo, Rong-**a Hao, ... Young Soo Kwon in The Journal of Supercomputing
    Article 17 March 2024
  4. On near–MDS codes and caps

    Michela Ceria, Antonio Cossidente, ... Francesco Pavese in Designs, Codes and Cryptography
    Article 11 November 2022
  5. Optimization of TCP Congestion Control Algorithms Loss-Based in Wireless Network

    With the rapid development of computer network, today’s network structure has become very complex. The promotion of Wi-Fi and the widespread use of...
    **aolin **ng, Shujie Yang, ... Shuai Peng in Emerging Networking Architecture and Technologies
    Conference paper 2023
  6. B-Splines

    Reference work entry 2024
  7. An Efficient and Smooth Path Planner Based on Hybrid A* Search and Frenet Frames

    As the technology of autonomous vehicles advances, the importance of automatic path planning also grows significantly. This leads to the exploration...
    Pin-Wen Wang, Yi-Chi Tseng, Chung-Wei Lin in Security and Privacy in Cyber-Physical Systems and Smart Vehicles
    Conference paper 2024
  8. On the thermal performance during flow dynamics of viscoelastic fluid in a channel: Jaffrey–Hamel extension

    An extended Jaffrey–Hamel problem with heat and mass transfer attributes of viscoelastic fluid over an isothermal porous conduit, where the flow is...

    Sohail Rehman, Sultan Alqahtani, ... Sultan Alshehery in Neural Computing and Applications
    Article 26 August 2023
  9. Faster Cryptographic Hash Function from Supersingular Isogeny Graphs

    We propose a variant of the CGL hash algorithm [5] that is significantly faster than the original algorithm, and prove that it is preimage and...
    Javad Doliskani, Geovandro C. C. F. Pereira, Paulo S. L. M. Barreto in Selected Areas in Cryptography
    Conference paper 2024
  10. A survey of elliptic curves for proof systems

    Elliptic curves have become key ingredients for instantiating zero-knowledge proofs and more generally proof systems. Recently, there have been many...

    Diego F. Aranha, Youssef El Housni, Aurore Guillevic in Designs, Codes and Cryptography
    Article 21 December 2022
  11. Hyper star structure fault tolerance of half hypercube

    The reliability of interconnection networks ordinarily is measured by all kinds of connectivities. The qualitative and quantitative analysis relies...

    Lulu Yang, Shuming Zhou in The Journal of Supercomputing
    Article 08 July 2024
  12. A Design Method of Knee Pad Based on User Data

    Lattice structures are designed structures with excellent mechanical properties. Because of the continuous development of parametric design and...
    Conference paper 2022
  13. FERROMOBILE and Security for Low Moment of Traffic Level Crossing

    Level crossings (LCs) are critical components of railway networks and their safety is always at the centre of debate. Several accidents have occurred...
    Rim Brahim, Simon Collart-Dutilleul, ... Nour-eddin El Faouzi in Risks and Security of Internet and Systems
    Conference paper 2024
  14. A three-dimensional extension of the slope chain code: analyzing the tortuosity of the flagellar beat of human sperm

    In the realm of 3D image processing, accurately representing the geometric nuances of line curves is crucial. Building upon the foundation set by the...

    Andrés Bribiesca-Sánchez, Adolfo Guzmán, ... Ernesto Bribiesca in Pattern Analysis and Applications
    Article Open access 28 June 2024
  15. Fault Diagnosability of Regular Networks Under the Hybrid PMC Model

    Large scale multiprocessor systems or multicomputer systems, taking interconnection networks as underlying topologies, have been widely used in the...
    Jiafei Liu, Qianru Zhou, ... Shuming Zhou in Computing and Combinatorics
    Conference paper 2021
  16. Hashing into Twisted Jacobi Intersection Curves

    By generalizing Jacobi intersection curves introduced by D. V. Chudnovsky and G. V. Chudnovsky, Feng et al. proposed twisted Jacobi intersection...
    **aoyang He, Wei Yu, Kunpeng Wang in Information Security and Cryptology
    Conference paper 2018
  17. Algorithms for Matrix Code and Alternating Trilinear Form Equivalences via New Isomorphism Invariants

    We devise algorithms for finding equivalences of trilinear forms over finite fields modulo linear group actions. Our focus is on two problems under...
    Anand Kumar Narayanan, Youming Qiao, Gang Tang in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  18. Image encryption algorithm based on factorial decomposition

    This study proposes a highly efficient image encryption algorithm by employing a rapid key generation approach and permutation structure. The image...

    Muath AlShaikh, Malek Alzaqebah, ... Mostefa Kara in Multimedia Tools and Applications
    Article 03 January 2024
Did you find what you were looking for? Share feedback.