Results 191 to 200 of about 45,527 (206)
Some of the next articles are maybe not open access.
A low-area unified hardware architecture for the AES and the cryptographic hash function ECHO
Journal of Cryptographic Engineering, 2011Jean-Luc Beuchat +2 more
semanticscholar +1 more source
Enhanced Frequency Fusion Network with Dynamic Hash Attention for image denoising
Information Fusion, 2023exaly
MOSAIK: A Hash-Based Algorithm for Accurate Next-Generation Sequencing Short-Read Mapping
PLoS ONE, 2014Wan-Ping Lee +2 more
exaly
A Chaos-Based Cryptographic Hash Function for Message Authentication
International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 2005H. S. Kwok, W. Tang
semanticscholar +1 more source
Adaptive hash retrieval with kernel based similarity
Pattern Recognition, 2018Xiao Bai, Haichuan Yang, Lu Bai
exaly
Hash polynomial two factor decision tree using IoT for smart health care scheduling
Expert Systems With Applications, 2020Manikandan Ramachandran +2 more
exaly
Hash-Mark-Shaped Azaacene Tetramers with Axial Chirality
Journal of the American Chemical Society, 2018Daisuke Sakamaki +2 more
exaly
Efficient chameleon hash functions in the enhanced collision resistant model
Information Sciences, 2020Mohammad Dakhilalian, Willy Susilo
exaly
Simple hash function using discrete-time quantum walks
Quantum Information Processing, 2018Yu-Guang Yang
exaly
A novel image encryption based on hash function with only two-round diffusion process
Multimedia Systems, 2013Benyamin Norouzi +2 more
exaly

