Results 161 to 170 of about 38,362 (243)

STITCH-256: A Dedicated Cryptographic Hash Function

open access: yesJournal of Applied Sciences, 2012
Ramlan Mahmod   +4 more
openaire   +2 more sources

Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases [PDF]

open access: green, 1997
Ahmad Baraani-Dastjerdi   +3 more
openalex   +1 more source

Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach

open access: diamond
Vadim Davydov   +3 more
openalex   +1 more source

Home - About - Disclaimer - Privacy