Showing 1,121 - 1,140 results of 1,322 for search '"bit"', query time: 0.07s Refine Results
  1. 1121

    New attacks against reduced Rijndael‐160 by Xiaoli Dong, Yongzhuang Wei

    Published 2022-01-01
    “…For the improved 8‐round ID attacks, to take advantage of the key‐schedule weaknesses for Rijndael‐160 under key sizes of 160 and 256 bits, some new attack paths are found. With these attack paths, the 5‐round IDs are proposed based on the property of MixColumns above, and then the attacks on the 8‐round Rijndael‐160 under key sizes of 160 and 256 bits are performed. …”
    Get full text
    Article
  2. 1122

    Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application by Sadam Hussain, Muhammad Asif, Tariq Shah, Abid Mahboob, Sayed M. Eldin

    Published 2023-01-01
    “…The observed speed of this technique, which uses a key of 256 bits and a block size of 128 bits, is comparable to three-key triple-DES.…”
    Get full text
    Article
  3. 1123
  4. 1124

    High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion by Fei Wang, Zhaoxin Xie, Zuo Chen

    Published 2014-01-01
    “…Second, in order to reduce location map bits length, we introduced histogram shifting scheme. …”
    Get full text
    Article
  5. 1125

    ECN-Based Congestion Probability Prediction over Hybrid Wired-Wireless Networks by Jin Ye, Jiawei Huang, Jianxin Wang, Shigeng Zhang, Zhenrong Zhang

    Published 2014-03-01
    “…This method combines the information contained in CE bits of a sequence of ECN-enabled acknowledge packets to calculate the probability of network congestion; thus it is more accurate than methods using CE bits of a single acknowledge packet. …”
    Get full text
    Article
  6. 1126

    Research on linear approximations of simplified Trivium by Meng MA, Ya-qun ZHAO

    Published 2016-06-01
    “…The linear approximations of simplified Trivium with the initialization of 288 clocks(2-round Trivium) was studied.An algorithm was designed to search optimal linear approximations.Moreover,a method was presented to conduct a linear approximation of 2-round Trivium by approximating the first round equation which involved the key bits,…”
    Get full text
    Article
  7. 1127

    Noise Robustness of Quantum Relaxation for Combinatorial Optimization by Kentaro Tamura, Yohichi Suzuki, Rudy Raymond, C. Hiroshi Watanabe, Yuki Sato, Ruho Kondo, Michihiko Sugawara, Naoki Yamamoto

    Published 2024-01-01
    “…Quantum random-access optimization (QRAO) is a quantum-relaxation-based optimizer that uses fewer qubits than the number of bits in the original problem by encoding multiple variables per qubit using quantum random-access code (QRAC). …”
    Get full text
    Article
  8. 1128

    Locality preserving binary face representations using auto‐encoders by Mohamed Amine Hmani, Dijana Petrovska‐Delacrétaz, Bernadette Dorizzi

    Published 2022-09-01
    “…Using a pretrained convolutional neural network and training the model on a cleaned version of the MS‐celeb‐1M database, binary representations of length 4096 bits and 3300 bits of entropy are obtained. The extracted representations have high entropy and are long enough to be used in crypto‐biometric systems, such as fuzzy commitment. …”
    Get full text
    Article
  9. 1129
  10. 1130

    Lo Batèu de pèira, ou la recherche des signes by Marie-Jeanne Verny

    Published 2022-03-01
    “…This article attempts to decipher, through an apparent narrative complexity, the signs scattered by the author, between masks and unveiling, which reconstitute, in bits and pieces, a long-concealed reality.…”
    Get full text
    Article
  11. 1131

    High data rate transmissions in UWB system using orthogonal pulses by LIANG Zhao-hui1, DU Hong-feng1, ZHOU Zheng1

    Published 2005-01-01
    “…Two orthogonal pulses based on wavelet were presented,their spectrum meet FCC spectral mask for ultra wideband (UWB) system.A novel method for high data rate transmissions in UWB system was proposed.It employs a combination of pulse polarity and orthogonal pulses shape modulation and implements high date rate by transmitting more bits simultaneously.…”
    Get full text
    Article
  12. 1132

    Bi-GRU Enhanced Cost-Effective Memory-Aware End-to-End Learning for Geometric Constellation Shaping in Optical Coherent Communications by Zhiyang Liu, Xiaoyu Liu, Shilin Xiao, Weiying Yang, Weisheng Hu

    Published 2024-01-01
    “…Results show that the proposed bi-GRU based GCS scheme can achieve a performance gain over square 64QAM in mutual information (MI) with 0.12 bits/symbol and a Q-factor gain of 0.4 dB at optimal launched optical power. …”
    Get full text
    Article
  13. 1133
  14. 1134
  15. 1135

    An Integrated Image Encryption Scheme Based on Elliptic Curve by Ijaz Khalid, Tariq Shah, Sayed M. Eldin, Dawood Shah, Muhammad Asif, Imran Saddique

    Published 2023-01-01
    “…Afterwards, the proposed scheme uses the first 128-bits for the confidentiality of the data, while the remaining 128-bits are for authentication. …”
    Get full text
    Article
  16. 1136

    Measuring Complexity in Manufacturing: Integrating Entropic Methods, Programming and Simulation by Germán Herrera-Vidal, Jairo R. Coronado-Hernández, Ivan Derpich-Contreras, Breezy P. Martínez Paredes, Gustavo Gatica

    Published 2025-01-01
    “…The results confirm that factors such as production sequence and product volume significantly influence the structural complexity of the workstations, with station A being less complex (0.4154 to 0.9913 bits) compared to stations B and C, which reached up to 2.2084 bits. …”
    Get full text
    Article
  17. 1137

    Topology-Aware Bus Routing in Complex Networks of Very-Large-Scale Integration with Nonuniform Track Configurations and Obstacles by Ziran Zhu, Zhipeng Huang, Jianli Chen, Longkun Guo

    Published 2021-01-01
    “…As one of the most important routing problems in the complex network within a very-large-scale integration (VLSI) circuit, bus routing has become much more challenging when witnessing the advanced technology node enters the deep nanometer era because all bus bits need to be routed with the same routing topology in the context. …”
    Get full text
    Article
  18. 1138

    A Type of Coding Method of IPv6 Flow Label with QoS Support by Yangchun Li, Weiwei Feng, Jie Zou, Jinghua Tan

    Published 2013-09-01
    “…By redefining the reserved CU bits in IPv6 header traffic class field and the structured code of IPv6 flow label,the region information, application information, port number or other information were defined. …”
    Get full text
    Article
  19. 1139
  20. 1140