Results 181 to 190 of about 45,527 (206)
Some of the next articles are maybe not open access.

Exploring Chaotic Neural Network for Cryptographic Hash Function

, 2014
Prateek Singla   +2 more
semanticscholar   +1 more source

Partitioning of a 2-bit hash function across 66 communicating cells

Nature Chemical Biology
Jai P. Padmakumar   +8 more
semanticscholar   +1 more source

A Fast New Cryptographic Hash Function Based on Integer Tent Mapping System

Journal of Computers, 2012
Jiandong Liu   +3 more
semanticscholar   +1 more source

Towards an automatic design of non-cryptographic hash function

International Conference on Telecommunications and Signal Processing, 2011
J. Karasek, Radim Burget, Ondrej Morsky
semanticscholar   +1 more source

VLSI Characterization of the Cryptographic Hash Function BLAKE

IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2011
L. Henzen   +3 more
semanticscholar   +1 more source

A physical hash for preventing and detecting cyber-physical attacks in additive manufacturing systems

Journal of Manufacturing Systems, 2020
Logan Sturm   +2 more
exaly  

Home - About - Disclaimer - Privacy