Symmetric function
-
The paper proposes a type of block cipher algorithm based on cryptographic hash function and public key cryptography. The algorithm proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.
11p visergeyne 18-06-2024 3 0 Download
-
Ebook "Protein design: Methods and applications (Second edition)" expands upon the previous edition with current, detailed ideas on how to approach a potential protein design project. With new chapters on metals as structure-forming elements and functional sites, the design and characterization of fluorinated proteins, top-down symmetric deconstruction and the design of protein libraries and novel or repurposed enzymes.
291p dongmelo 27-05-2024 5 2 Download
-
In the paper "Thermal buckling of P-FGM sandwich beam with porous core on elastic foundation", a coupled effect of thermal and electrical loadings on the thermal buckling behavior of functionally graded material (FGM) sandwich beam resting on Pasternak foundation is investigated. The symmetric multi-layered beam consists of a foam core, two middle FGM layers, and two outer piezoelectric layers. It is assumed that the beam is subjected to a constant voltage and a uniform/linear temperature rise.
10p dathienlang1012 03-05-2024 1 0 Download
-
The geometries and relative stabilities of 15 tautomeric forms and the corresponding isomers of the studied molecules have been identified and their relative stabilities are investigated. The potential energy profiles and intrinsic reaction coordinates (IRC) calculations along the proton transfer coordinates both in the ground and in the excited state are monitored as well. The impact of the donating (OMe) and withdrawing (NO2) groups on the single and double proton transfers are investigated both in the gas phase and solution.
9p dianmotminh02 03-05-2024 4 1 Download
-
Part 1 book "Internet security - Cryptographic principles algorithms protocols" includes content: Internetworking and layered models; tcp ip suite and internet stack protocols; symmetric block ciphers; hash function, message digest and message authentication code, asymmetric public key cryptosystems.
221p longtimenosee08 31-03-2024 5 1 Download
-
The paper proposes a type of block cipher scheme based on cryptographic hash function and public key cryptography. The scheme proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.
20p vigojek 02-02-2024 2 0 Download
-
The novelty of the present work is to study the simultaneous influence of porosities and partial Pasternak foundation support on dynamics of functionally graded (FG) beams carrying a moving load. The beams are made from an open-cell steel foam with symmetric and asymmetric porosity distributions in the thickness direction.
16p vialfrednobel 21-12-2023 2 2 Download
-
Continued part 1, part 2 of ebook "Partial differential equations: An introduction" provides readers with contents including: Chapter 9 - Waves in space; Chapter 10 - Boundaries in the plane and in space; Chapter 11 - General eigenvalue problems; Chapter 12 - Distributions and transforms; Chapter 13 - PDE problems from physics; Chapter 14 - Nonlinear PDEs;...
227p caongulam 10-11-2023 6 4 Download
-
Part 1 of ebook "Introductory quantum mechanics: A traditional approach emphasizing connections with classical physics" provides readers with contents including: mathematical preliminaries; free-particle Schrödinger equation - wave packets; Schrödinger's equation with potential energy - introduction to operators; postulates and basic elements of quantum mechanics - properties of operators; simple harmonic oscillator - one dimension; problems in two and three-dimensions - general considerations;...
317p dangsovu 20-10-2023 7 3 Download
-
Ebook Information security: Principles and practice includes contents: Chapter 1: introduction; chapter 2: classic cryptography; chapter 3: symmetric key crypto; chapter 4: public key crypto; chapter 5: hash functions; chapter 6: advanced cryptanalysis; chapter 7: authentication; chapter 8: authorization; chapter 9: authentication protocols; chapter 10: real-world protocols; chapter 11: software flaws and malware; chapter 12: insecurity in software; chapter 13: os and security.
413p haojiubujain06 05-09-2023 4 3 Download
-
The article proposes a public-key cryptographic scheme based on the ElGamal algorithm. This scheme can perform security functions and authenticate the origin and integrity of the encrypted message simultaneously. Moreover, the proposed scheme is also used as the basis for developing an algorithm to establish a shared secret key for symmetric key cryptosystems.
10p viengels 25-08-2023 6 4 Download
-
In this paper, we introduce a new method for image enhancement of optical systems with radially symmetric phase masks. The optical system with a traditional radial symmetric phase mask would result in a dot point spread function.
8p videadpool 05-05-2023 9 4 Download
-
The article proposes a method for constructing public-key block cipher schemes based on the difficulty of the discrete logarithm problem on elliptic curves. The schemas are construc according to the proposed method and can simultaneously perform security functions and authenticate the origin and integrity of the encrypted message.
8p visirius 19-01-2023 7 2 Download
-
Lecture Cryptography and network security: Chapter 10 after studying this section will help you understand: To distinguish between two cryptosystems: symmetric-key and asymmetric-key; To introduce trapdoor one-way functions and their use in asymmetric-key cryptosystems; To introduce the knapsack cryptosystem as one of the first ideas in asymmetric-key cryptography;...
59p hoathachthao090 10-02-2022 19 4 Download
-
Cytosine methylation is a covalent modification of DNA that is shared by plants, animals, and other eukaryotes [1]. The most frequently methylated sequences in plant genomes are symmetrical CG dinucleotides, and this methylation is maintained across cell divisions by the MET1 family of methyltransferases.
3p vialfrednobel 29-01-2022 15 0 Download
-
Leaf length and width could be a functioning relationship naturally as plant designs. Single-vein leaves have the simplest symmetrical distribution and structural design, which means that fast-growing single-vein species could interpret the scheme more efficiently.
11p vijichea2711 28-05-2021 9 1 Download
-
The following will be discussed in Cryptography and Network Security Principles and Practices - Part 1: Introduction, classical encryption techniques, block ciphers and the data encryption standard, finite fields, advanced encryption standard, more on symmetric ciphers, confidentiality using symmetric encryption, introduction to number theory, public-key cryptography and RSA, key management - other public-key cryptosystems, message authentication and hash functions, hash and MAC algorithms, digital signatures and authentication protocols,...
576p lovebychance04 20-05-2021 35 5 Download
-
"Ebook Information security and cryptography texts and monographs" present symmetric-key encryption, public-key cryptography, cryptographic protocols, probabilistic algorithms, one-way functions and the basic assumptions, bit security of one-way functions, one-way functions and pseudorandomness, provably secure encryption...
372p haphuonglan2021 25-04-2021 36 16 Download
-
It is well-known that some famous probability density functions (PDF) of random variables are associated with symmetries of these random variables. The Boltzmann and Gaussian PDFs that are invariant under translation and spherical transformations of their variables, respectively, are obvious and well-studied examples reflecting not only symmetries of many physical phenomena but also their underlying conservation laws.
14p 035522894 26-03-2020 47 2 Download
-
In this paper, a new realization of the fractional capacitor (FC) using passive symmetric networks is proposed. A general analysis of the symmetric network that is independent of the internal impedance composition is introduced. Three different internal impedances are utilized in the network to realize the required response of the FC. These three cases are based on either a series RC circuit, integer Coleimpedance circuit, or both. The network size and the values of the passive elements are optimized using the minimax and least mth optimization techniques.
13p caygaocaolon1 13-11-2019 15 0 Download