Articles with "polynomial function" as a keyword



Photo by hudsoncrafted from unsplash

A new design paradigm for provably secure keyless hash function with subsets and two variables polynomial function

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of King Saud University - Computer and Information Sciences"

DOI: 10.1016/j.jksuci.2019.10.003

Abstract: Abstract Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256,… read more here.

Keywords: provably secure; polynomial function; sha; hash function ... See more keywords
Photo by efekurnaz from unsplash

Analysis of lactation feed intakes for sows with extended lactation lengths

Sign Up to like & get
recommendations!
Published in 2017 at "Translational Animal Science"

DOI: 10.2527/tas2017-0016

Abstract: Abstract The objectives of this research were to quantify and model daily feed intakes to 28 d of lactation in modern sows. A total of 4,512 daily feed intake (DFI) records were collected for 156… read more here.

Keywords: polynomial function; three groups; random effects; feed intakes ... See more keywords