Results 101 to 110 of about 2,959 (212)

Analysis of cryptographic hash functions

open access: yes, 2012
The National Institute of Standards and Technology (NIST) launched in 2008 a public competition, called the SHA-3 competition, aiming at definining a new standard for hash functions. We study here the algebraic properties of some of the candidates to this contest. Among the functions analyzed, is the Keccak algorithm, which was recently announced to be
openaire   +1 more source

Securing internet of things devices using a hybrid approach. [PDF]

open access: yesSci Rep
Jenny RS   +9 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy