Results 191 to 200 of about 45,527 (206)
Some of the next articles are maybe not open access.

A low-area unified hardware architecture for the AES and the cryptographic hash function ECHO

Journal of Cryptographic Engineering, 2011
Jean-Luc Beuchat   +2 more
semanticscholar   +1 more source

A Chaos-Based Cryptographic Hash Function for Message Authentication

International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 2005
H. S. Kwok, W. Tang
semanticscholar   +1 more source

Adaptive hash retrieval with kernel based similarity

Pattern Recognition, 2018
Xiao Bai, Haichuan Yang, Lu Bai
exaly  

Hash polynomial two factor decision tree using IoT for smart health care scheduling

Expert Systems With Applications, 2020
Manikandan Ramachandran   +2 more
exaly  

Hash-Mark-Shaped Azaacene Tetramers with Axial Chirality

Journal of the American Chemical Society, 2018
Daisuke Sakamaki   +2 more
exaly  

Efficient chameleon hash functions in the enhanced collision resistant model

Information Sciences, 2020
Mohammad Dakhilalian, Willy Susilo
exaly  

Simple hash function using discrete-time quantum walks

Quantum Information Processing, 2018
Yu-Guang Yang
exaly  

A novel image encryption based on hash function with only two-round diffusion process

Multimedia Systems, 2013
Benyamin Norouzi   +2 more
exaly  

Home - About - Disclaimer - Privacy