Results 181 to 190 of about 45,527 (206)
Some of the next articles are maybe not open access.
Exploring Chaotic Neural Network for Cryptographic Hash Function
, 2014Prateek Singla +2 more
semanticscholar +1 more source
Partitioning of a 2-bit hash function across 66 communicating cells
Nature Chemical BiologyJai P. Padmakumar +8 more
semanticscholar +1 more source
A Fast New Cryptographic Hash Function Based on Integer Tent Mapping System
Journal of Computers, 2012Jiandong Liu +3 more
semanticscholar +1 more source
Towards an automatic design of non-cryptographic hash function
International Conference on Telecommunications and Signal Processing, 2011J. Karasek, Radim Burget, Ondrej Morsky
semanticscholar +1 more source
VLSI Characterization of the Cryptographic Hash Function BLAKE
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2011L. Henzen +3 more
semanticscholar +1 more source
Data Query Mechanism Based on Hash Computing Power of Blockchain in Internet of Things
Sensors, 2020Yongjun Ren, Jin Wang, Osama AlFarraj
exaly
A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2
Nonlinear Dynamics, 2015Ramzi Guesmi
exaly

