Search
Search Results
-
On cryptographic properties of cubic and splitting Boolean functions
The weight, balancedness and nonlinearity are important properties of Boolean functions, but they can be difficult to determine in general. In this...
-
Hyper star structure connectivity of hierarchical folded cubic networks
With the increasing popularity and diversity of network environments, it is crucial to assess the fault tolerance and stability of the network....
-
Optimization of TCP Congestion Control Algorithms Loss-Based in Wireless Network
With the rapid development of computer network, today’s network structure has become very complex. The promotion of Wi-Fi and the widespread use of... -
-
An Efficient and Smooth Path Planner Based on Hybrid A* Search and Frenet Frames
As the technology of autonomous vehicles advances, the importance of automatic path planning also grows significantly. This leads to the exploration... -
On the thermal performance during flow dynamics of viscoelastic fluid in a channel: Jaffrey–Hamel extension
An extended Jaffrey–Hamel problem with heat and mass transfer attributes of viscoelastic fluid over an isothermal porous conduit, where the flow is...
-
Faster Cryptographic Hash Function from Supersingular Isogeny Graphs
We propose a variant of the CGL hash algorithm [5] that is significantly faster than the original algorithm, and prove that it is preimage and... -
A survey of elliptic curves for proof systems
Elliptic curves have become key ingredients for instantiating zero-knowledge proofs and more generally proof systems. Recently, there have been many...
-
Hyper star structure fault tolerance of half hypercube
The reliability of interconnection networks ordinarily is measured by all kinds of connectivities. The qualitative and quantitative analysis relies...
-
A Design Method of Knee Pad Based on User Data
Lattice structures are designed structures with excellent mechanical properties. Because of the continuous development of parametric design and... -
FERROMOBILE and Security for Low Moment of Traffic Level Crossing
Level crossings (LCs) are critical components of railway networks and their safety is always at the centre of debate. Several accidents have occurred... -
A three-dimensional extension of the slope chain code: analyzing the tortuosity of the flagellar beat of human sperm
In the realm of 3D image processing, accurately representing the geometric nuances of line curves is crucial. Building upon the foundation set by the...
-
Fault Diagnosability of Regular Networks Under the Hybrid PMC Model
Large scale multiprocessor systems or multicomputer systems, taking interconnection networks as underlying topologies, have been widely used in the... -
Hashing into Twisted Jacobi Intersection Curves
By generalizing Jacobi intersection curves introduced by D. V. Chudnovsky and G. V. Chudnovsky, Feng et al. proposed twisted Jacobi intersection... -
-
Algorithms for Matrix Code and Alternating Trilinear Form Equivalences via New Isomorphism Invariants
We devise algorithms for finding equivalences of trilinear forms over finite fields modulo linear group actions. Our focus is on two problems under... -
Image encryption algorithm based on factorial decomposition
This study proposes a highly efficient image encryption algorithm by employing a rapid key generation approach and permutation structure. The image...