Results 231 to 240 of about 555,076 (261)
Some of the next articles are maybe not open access.
Some Observations on the Theory of Cryptographic Hash Functions
Designs, Codes and Cryptography, 2006In this paper, we study issues related to the notion of "secure" hash functions. Several necessary conditions are considered, as well as a popular sufficient condition (the so-called random oracle model). We study the security of various problems that are motivated by the notion of a secure hash function.
openaire +1 more source
A Parallel Algorithm for Extending Cryptographic Hash Functions
2001We describe a parallel algorithm for extending a small domain hash function to a very large domain hash function. Our construction can handle messages of any practical length and preserves the security properties of the basic hash function. The construction can be viewed as a parallel version of the well known Merkle-Damgard construction, which is a ...
Palash Sarkar, Paul J. Schellenberg
openaire +2 more sources
A quantum hash function with grouped coarse-grained boson sampling
Quantum Information Processing, 2022Jinjing Shi+6 more
semanticscholar +1 more source
Faster Cryptographic Hash Function From Supersingular Isogeny Graphs
IACR Cryptology ePrint Archive, 2017Javad Doliskani+2 more
semanticscholar +1 more source
Cryptographic one-way hash function generation using twelve-terms 4D nonlinear system
International journal of information technology, 2018Musheer Ahmad+2 more
semanticscholar +1 more source
A systematic review of rehabilitation and exercise recommendations in oncology guidelines
Ca-A Cancer Journal for Clinicians, 2021Kathleen Doyle Lyons+2 more
exaly
Cancer epigenetics in clinical practice
Ca-A Cancer Journal for Clinicians, 2023Veronica Davalos, Manel Esteller
exaly