Lightweight three-factor authentication protocol for 6G-enabled healthcare systems using Chebyshev chaotic maps and BioHashing. [PDF]
Abbas AM, Nasr ME, Abdelfatah RI.
europepmc +1 more source
Anonymous and Efficient Chaotic Map-Based Authentication Protocol for Industrial Internet of Things. [PDF]
Zeng D +6 more
europepmc +1 more source
Cryptographic Hash Functions and Attacks – A Detailed Study
Rituparna Kundu
openalex +2 more sources
Optimising the SHA‐512 cryptographic hash function on FPGAs [PDF]
George S. Athanasiou +3 more
openalex +1 more source
A Post-Quantum Secure RFID Authentication Protocol Based on NTRU Encryption Algorithm. [PDF]
Liu H, Wu H, Ge N, Dong Q.
europepmc +1 more source
A new cryptographic key assignment scheme using a one-way hash function [PDF]
Hui‐Feng Huang
openalex +1 more source
Privacy-Preserving ECC-Based AKA for Resource-Constrained IoT Sensor Networks with Forgotten Password Reset. [PDF]
Yu Y, Wei K, Qi K, Wu W.
europepmc +1 more source
A hybrid blockchain migration framework for converting traditional databases into blockchain-based EMR systems. [PDF]
Al-Busaidi A, Mani J, Yoosuf MS, P V.
europepmc +1 more source
Construction of (4,8)-schemes of visual cryptography on the base of a class of linear hash functions [PDF]
N. A. Zorina, Y. V. Kosolapov
openalex +1 more source
Error Correction Capabilities of Non-Linear Cryptographic Hash Functions [PDF]
Alejandro Cohen +1 more
openalex +1 more source

