Adaptive Restart and CEGAR-based Solver for Inverting Cryptographic Hash Functions
Saeed Nejati +4 more
openalex +2 more sources
Cryptographic Hash Functions from Expander Graphs [PDF]
Denis Charles +2 more
openalex +1 more source
S-HASH: A Crack Towards Cryptographic Hash Functions
Kaushal Jangid, Vidushi
openalex +2 more sources
Scanning and Detection of virus using cryptographic hash function
O Himgouri +4 more
openalex +1 more source
Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models [PDF]
Elijah Pelofske +2 more
openalex +1 more source
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source
Quantum secured blockchain framework for enhancing post quantum data security. [PDF]
Reddy NR +5 more
europepmc +1 more source
An Enhanced Non-Cryptographic Hash Function
Vivian Akoto-Adjepong +2 more
openalex +1 more source
Post-Quantum enhanced Ascon for secure vehicular IoT data integrity. [PDF]
A J B, P K, R K, R M.
europepmc +1 more source

