Results 181 to 190 of about 40,689 (200)
Some of the next articles are maybe not open access.
Troika: a ternary cryptographic hash function
Designs, Codes and Cryptography, 2019zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kölbl, Stefan +3 more
openaire +2 more sources
The NIST Cryptographic Workshop on Hash Functions
IEEE Security & Privacy Magazine, 2006In light of recent breakthroughs on the cryptanalysis of hash functions, the US National Institute for Standards and Technology (NIST) organized a workshop to solicit input on the current status of the Secure Hash Algorithm-1 (SHA-1) family of hash functions.
C. Rechberger, V. Rijmen, N. Sklavos
openaire +1 more source
Optimized algorithms and architectures for fast non-cryptographic hash functions in hardware
Microprocessors and Microsystems, 2023Arish Sateesan +2 more
exaly
Novel cryptographic hash function based on multiple compressive parallel structures
Soft Computing, 2022exaly
A CHAOS-BASED CRYPTOGRAPHIC HASH FUNCTION FOR MESSAGE AUTHENTICATION
International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 2005Wallace K S Tang
exaly
LOCHA: A Light-weight One-way Cryptographic Hash Algorithm for Wireless Sensor Network
Procedia Computer Science, 2014Amrita Roy Chowdhury +2 more
exaly
Hash function based on chaotic tent maps
IEEE Transactions on Circuits and Systems Part 2: Express Briefs, 2005Xun Yi
exaly

