Results 91 to 100 of about 3,302 (195)
Efficient Negative Databases from Cryptographic Hash Functions
George Danezis +5 more
openalex +2 more sources
Study About the Performance of Ascon in Arduino Devices
In 2023, the Ascon cipher suite was selected as the winner of the National Institute of Standards and Technology (NIST) standardization process for lightweight cryptography, and has emerged as the leading candidate for cryptographic algorithms in ...
Ventura Sarasa Laborda +4 more
doaj +1 more source
Building Provably Secure Block Ciphers from Cryptographic Hash Functions
F. Charles
openalex +1 more source
Implementation of a Data-Parallel Approach on a Lightweight Hash Function for IoT Devices
The Internet of Things is used in many application areas in our daily lives. Ensuring the security of valuable data transmitted over the Internet is a crucial challenge.
Abdullah Sevin
doaj +1 more source
The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition
Bart Preneel
openalex +2 more sources
Correction: Antibodies and cryptographic hash functions: quantifying the specificity paradox [PDF]
Robert J. Petrella
openalex +1 more source
Universal one-way hash functions and their cryptographic applications [PDF]
Moni Naor, Moti Yung
openalex +1 more source
An Efficient Construction of a Compression Function for Cryptographic Hash
Rashed Mazumder +2 more
openalex +2 more sources
Cryptographic Hashing Beyond SHA: Designing collision-resistant, quantum-resilient hash functions [PDF]
Syed Khundmir Azmi
openalex +1 more source

