Results 181 to 190 of about 40,689 (200)
Some of the next articles are maybe not open access.

Troika: a ternary cryptographic hash function

Designs, Codes and Cryptography, 2019
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kölbl, Stefan   +3 more
openaire   +2 more sources

The NIST Cryptographic Workshop on Hash Functions

IEEE Security & Privacy Magazine, 2006
In light of recent breakthroughs on the cryptanalysis of hash functions, the US National Institute for Standards and Technology (NIST) organized a workshop to solicit input on the current status of the Secure Hash Algorithm-1 (SHA-1) family of hash functions.
C. Rechberger, V. Rijmen, N. Sklavos
openaire   +1 more source

Optimized algorithms and architectures for fast non-cryptographic hash functions in hardware

Microprocessors and Microsystems, 2023
Arish Sateesan   +2 more
exaly  

Randomness testing of non-cryptographic hash functions for real-time hash table based storage and look-up of URLs

Journal of Network and Computer Applications, 2014
Tahir Bin Ahmad, Usman Younis
exaly  

A CHAOS-BASED CRYPTOGRAPHIC HASH FUNCTION FOR MESSAGE AUTHENTICATION

International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 2005
Wallace K S Tang
exaly  

LOCHA: A Light-weight One-way Cryptographic Hash Algorithm for Wireless Sensor Network

Procedia Computer Science, 2014
Amrita Roy Chowdhury   +2 more
exaly  

Hash function based on chaotic tent maps

IEEE Transactions on Circuits and Systems Part 2: Express Briefs, 2005
Xun Yi
exaly  

Home - About - Disclaimer - Privacy