intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Symmetric function

Xem 1-20 trên 72 kết quả Symmetric function
  • The paper proposes a type of block cipher algorithm based on cryptographic hash function and public key cryptography. The algorithm proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.

    pdf11p visergeyne 18-06-2024 3 0   Download

  • Ebook "Protein design: Methods and applications (Second edition)" expands upon the previous edition with current, detailed ideas on how to approach a potential protein design project. With new chapters on metals as structure-forming elements and functional sites, the design and characterization of fluorinated proteins, top-down symmetric deconstruction and the design of protein libraries and novel or repurposed enzymes.

    pdf291p dongmelo 27-05-2024 5 2   Download

  • In the paper "Thermal buckling of P-FGM sandwich beam with porous core on elastic foundation", a coupled effect of thermal and electrical loadings on the thermal buckling behavior of functionally graded material (FGM) sandwich beam resting on Pasternak foundation is investigated. The symmetric multi-layered beam consists of a foam core, two middle FGM layers, and two outer piezoelectric layers. It is assumed that the beam is subjected to a constant voltage and a uniform/linear temperature rise.

    pdf10p dathienlang1012 03-05-2024 1 0   Download

  • The geometries and relative stabilities of 15 tautomeric forms and the corresponding isomers of the studied molecules have been identified and their relative stabilities are investigated. The potential energy profiles and intrinsic reaction coordinates (IRC) calculations along the proton transfer coordinates both in the ground and in the excited state are monitored as well. The impact of the donating (OMe) and withdrawing (NO2) groups on the single and double proton transfers are investigated both in the gas phase and solution.

    pdf9p dianmotminh02 03-05-2024 4 1   Download

  • Part 1 book "Internet security - Cryptographic principles algorithms protocols" includes content: Internetworking and layered models; tcp ip suite and internet stack protocols; symmetric block ciphers; hash function, message digest and message authentication code, asymmetric public key cryptosystems.

    pdf221p longtimenosee08 31-03-2024 5 1   Download

  • The paper proposes a type of block cipher scheme based on cryptographic hash function and public key cryptography. The scheme proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.

    pdf20p vigojek 02-02-2024 2 0   Download

  • The novelty of the present work is to study the simultaneous influence of porosities and partial Pasternak foundation support on dynamics of functionally graded (FG) beams carrying a moving load. The beams are made from an open-cell steel foam with symmetric and asymmetric porosity distributions in the thickness direction.

    pdf16p vialfrednobel 21-12-2023 2 2   Download

  • Continued part 1, part 2 of ebook "Partial differential equations: An introduction" provides readers with contents including: Chapter 9 - Waves in space; Chapter 10 - Boundaries in the plane and in space; Chapter 11 - General eigenvalue problems; Chapter 12 - Distributions and transforms; Chapter 13 - PDE problems from physics; Chapter 14 - Nonlinear PDEs;...

    pdf227p caongulam 10-11-2023 6 4   Download

  • Part 1 of ebook "Introductory quantum mechanics: A traditional approach emphasizing connections with classical physics" provides readers with contents including: mathematical preliminaries; free-particle Schrödinger equation - wave packets; Schrödinger's equation with potential energy - introduction to operators; postulates and basic elements of quantum mechanics - properties of operators; simple harmonic oscillator - one dimension; problems in two and three-dimensions - general considerations;...

    pdf317p dangsovu 20-10-2023 7 3   Download

  • Ebook Information security: Principles and practice includes contents: Chapter 1: introduction; chapter 2: classic cryptography; chapter 3: symmetric key crypto; chapter 4: public key crypto; chapter 5: hash functions; chapter 6: advanced cryptanalysis; chapter 7: authentication; chapter 8: authorization; chapter 9: authentication protocols; chapter 10: real-world protocols; chapter 11: software flaws and malware; chapter 12: insecurity in software; chapter 13: os and security.

    pdf413p haojiubujain06 05-09-2023 4 3   Download

  • The article proposes a public-key cryptographic scheme based on the ElGamal algorithm. This scheme can perform security functions and authenticate the origin and integrity of the encrypted message simultaneously. Moreover, the proposed scheme is also used as the basis for developing an algorithm to establish a shared secret key for symmetric key cryptosystems.

    pdf10p viengels 25-08-2023 6 4   Download

  • In this paper, we introduce a new method for image enhancement of optical systems with radially symmetric phase masks. The optical system with a traditional radial symmetric phase mask would result in a dot point spread function.

    pdf8p videadpool 05-05-2023 9 4   Download

  • The article proposes a method for constructing public-key block cipher schemes based on the difficulty of the discrete logarithm problem on elliptic curves. The schemas are construc according to the proposed method and can simultaneously perform security functions and authenticate the origin and integrity of the encrypted message.

    pdf8p visirius 19-01-2023 7 2   Download

  • Lecture Cryptography and network security: Chapter 10 after studying this section will help you understand: To distinguish between two cryptosystems: symmetric-key and asymmetric-key; To introduce trapdoor one-way functions and their use in asymmetric-key cryptosystems; To introduce the knapsack cryptosystem as one of the first ideas in asymmetric-key cryptography;...

    pdf59p hoathachthao090 10-02-2022 19 4   Download

  • Cytosine methylation is a covalent modification of DNA that is shared by plants, animals, and other eukaryotes [1]. The most frequently methylated sequences in plant genomes are symmetrical CG dinucleotides, and this methylation is maintained across cell divisions by the MET1 family of methyltransferases.

    pdf3p vialfrednobel 29-01-2022 15 0   Download

  • Leaf length and width could be a functioning relationship naturally as plant designs. Single-vein leaves have the simplest symmetrical distribution and structural design, which means that fast-growing single-vein species could interpret the scheme more efficiently.

    pdf11p vijichea2711 28-05-2021 9 1   Download

  • The following will be discussed in Cryptography and Network Security Principles and Practices - Part 1: Introduction, classical encryption techniques, block ciphers and the data encryption standard, finite fields, advanced encryption standard, more on symmetric ciphers, confidentiality using symmetric encryption, introduction to number theory, public-key cryptography and RSA, key management - other public-key cryptosystems, message authentication and hash functions, hash and MAC algorithms, digital signatures and authentication protocols,...

    pdf576p lovebychance04 20-05-2021 35 5   Download

  • "Ebook Information security and cryptography texts and monographs" present symmetric-key encryption, public-key cryptography, cryptographic protocols, probabilistic algorithms, one-way functions and the basic assumptions, bit security of one-way functions, one-way functions and pseudorandomness, provably secure encryption...

    pdf372p haphuonglan2021 25-04-2021 36 16   Download

  • It is well-known that some famous probability density functions (PDF) of random variables are associated with symmetries of these random variables. The Boltzmann and Gaussian PDFs that are invariant under translation and spherical transformations of their variables, respectively, are obvious and well-studied examples reflecting not only symmetries of many physical phenomena but also their underlying conservation laws.

    pdf14p 035522894 26-03-2020 47 2   Download

  • In this paper, a new realization of the fractional capacitor (FC) using passive symmetric networks is proposed. A general analysis of the symmetric network that is independent of the internal impedance composition is introduced. Three different internal impedances are utilized in the network to realize the required response of the FC. These three cases are based on either a series RC circuit, integer Coleimpedance circuit, or both. The network size and the values of the passive elements are optimized using the minimax and least mth optimization techniques.

    pdf13p caygaocaolon1 13-11-2019 15 0   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
207 tài liệu
1446 lượt tải
320 tài liệu
1228 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2