Results 191 to 200 of about 40,689 (200)
Some of the next articles are maybe not open access.
High frequency implementation of cryptographic hash function Keccak-512 on FPGA devices
International Journal of Information and Computer Security, 2018Soufiane El Moumni
exaly
Optimising the SHA‐512 cryptographic hash function on FPGAs
IET Computers and Digital Techniques, 2014George S Athanasiou, George Theodoridis
exaly
Parallel cryptographic hash function based on cellular automata and random diffusion model
Applied Soft Computing JournalXiaohu Yan
exaly
INTERNATIONALLY STANDARDIZED EFFICIENT CRYPTOGRAPHIC HASH FUNCTION
Proceedings of the International Conference on Security and Cryptography, 2011openaire +1 more source
A 2D Cryptographic Hash Function Incorporating Homomorphic Encryption for Secure Digital Signatures
Advanced Materialsexaly

