Results 201 to 210 of about 75,969 (261)
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT. [PDF]
Park K, Kim M, Park Y.
europepmc +1 more source
B-UMCS: Blockchain-enabled Unified Medical Consultancy Service. [PDF]
Almohana A, Almomani I, El-Shafai W.
europepmc +1 more source
Hash-One: a lightweight cryptographic hash function
The increased demand for lightweight applications has triggered the need for appropriate security mechanisms in them. Lightweight cryptographic hash functions are among the major responses toward such a requirement.
Puliparambil Megha Mukundan+3 more
semanticscholar +3 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Troika: a ternary cryptographic hash function
Designs, Codes and Cryptography, 2019Linear codes over finite fields are one of the most well-studied areas in coding theory. While codes over finite fields of characteristic two are of particular practical interest due to their good implementation properties, ternary codes have been extensively studied as well.
Stefan Kölbl+3 more
semanticscholar +3 more sources
Different Cryptographic Hash Functions for Security in the Blockchain
2023 International Conference on Data Science and Network Security (ICDSNS), 2023In day-to-day life, everyone is concerned about their security and privacy, and their concern becomes more when it comes to transactions. The technology behind blockchain is quite young.
Dhramandra Sharma, Monika Saxena
semanticscholar +1 more source
Novel Non-cryptographic Hash Functions for Networking and Security Applications on FPGA
Euromicro Symposium on Digital Systems Design, 2021This paper proposes the design and FPGA implementation of five novel non-cryptographic hash functions, that are suitable to be used in networking and security applications that require fast lookup and/or counting architectures.
Thomas Claesen+3 more
semanticscholar +1 more source
Cellular Automata Based Hashing Algorithm (CABHA) for Strong Cryptographic Hash Function
IEEE International Conference on Electrical, Computer and Communication Technologies, 2019Cryptographic hash functions play a crucial role in information security. Cryptographic hash functions are used in various cryptographic applications to verify the message authenticity and integrity.
Kartik Rajeshwaran, Kakelli Anil Kumar
semanticscholar +1 more source