Zobrazeno 1 - 10
of 1 117
pro vyhledávání: '"universal hashing"'
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 2 (2023)
Universal hash functions play a prominent role in the design of message authentication codes and the like. Whereas it is known how to build highly efficient sequential universal hash functions, parallel non-algebraic universal hash function designs a
Externí odkaz:
https://doaj.org/article/0400550f17104f1fa2403972fe31a35d
Publikováno v:
IACR Transactions on Symmetric Cryptology; Volume 2023, Issue 2; 69-93
Universal hash functions play a prominent role in the design of message authentication codes and the like. Whereas it is known how to build highly efficient sequential universal hash functions, parallel non-algebraic universal hash function designs a
Publikováno v:
Journal of Lightwave Technology. 39:5680-5690
Flexible Ethernet (FlexE) over WDM transport is one of the key technologies for achieving high-speed next generation radio access network (NG-RAN). The security issue, such as optical fiber wiretap, becomes increasingly prominent. However, optical or
Autor:
Khodakhast Bibak, Robert Ritchie
Publikováno v:
The Journal of Supercomputing. 78:945-961
Many concurrency platforms offer a processor oblivious model of computation, where the scheduler dynamically distributes work across threads. While this is convenient, it introduces non-determinism at runtime, which complicates debugging, because a p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
The collection of scientific works of the National Academy of the National Guard of Ukraine; Том 2, № 34 (2019); 58-65
Збірник наукових праць Національної академії Національної гвардії України; Том 2, № 34 (2019); 58-65
Збірник наукових праць Національної академії Національної гвардії України; Том 2, № 34 (2019); 58-65
Досліджено шляхи підвищення імітостійкості сигналів попередження систем охорони НГУ на об’єктах критичної інфраструктури. Виконано а
Autor:
Alla Gavrilova, Ihor Volkov, Yuliia Kozhedub, Roman Korolev, Oleksandr Lezik, Volodymyr Medvediev, Oleksandr Milov, Bogdan Tomashevsky, Andrii Trystan, Oksana Chekunova
Publikováno v:
Eastern-European Journal of Enterprise Technologies, Vol 4, Iss 9 (106), Pp 45-63 (2020)
The development of computer technology has determined the vector for the expansion of services based on the Internet and “G” technologies. The main requirements for modern services in the banking sector are security and reliability. At the same t
Autor:
T. A. Bilyk, A. U. Nesterenko
Publikováno v:
Безопасность информационных технологий, Vol 19, Iss 2, Pp 38-42 (2012)
The article covers the research of message authentication codes based on universal hashing. The new message authentication code algorithm is described here. The analysis of the algorithm is also provided in this article.
Externí odkaz:
https://doaj.org/article/9d20ed213bbc486780a19d75b18ef0d3
Autor:
Jeřábek, Emil
Publikováno v:
The Journal of Symbolic Logic, 2009 Sep 01. 74(3), 829-860.
Externí odkaz:
https://www.jstor.org/stable/40378097
Autor:
Sufyan T. Faraj
Publikováno v:
مجلة جامعة الانبار للعلوم الصرفة, Vol 2, Iss 1, Pp 1-11 (2008)
SSL/TLS is the protocol that is used for the vast majority of secure transactions over the Internet. However, this protocol needs to be extended in order to create a promising platform for the integration of quantum cryptography (QC) into the Interne
Externí odkaz:
https://doaj.org/article/e66775c6eb434ba5b9a55f332d182046