Results 161 to 170 of about 36,351 (194)
Secure and scalable dual blockchain and IPFS driven IoT ecosystem for next gen healthcare systems. [PDF]
Mallick SR, Lenka RK, Sobhanayak S.
europepmc +1 more source
Omega deoxyribonucleic acid cryptography key-based authentication. [PDF]
Chuah CW, Tey J, Mohamad KM.
europepmc +1 more source
Edge-Enabled Hybrid Encryption Framework for Secure Health Information Exchange in IoT-Based Smart Healthcare Systems. [PDF]
Ghani NA +4 more
europepmc +1 more source
EUPID-configurable privacy-preserving record linkage in federated health data spaces. [PDF]
Hayn D +10 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cryptographic Hash Functions from Expander Graphs
Journal of Cryptology, 2007zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Charles, Denis X. +2 more
openaire +4 more sources
The NIST Cryptographic Workshop on Hash Functions
IEEE Security & Privacy Magazine, 2006In light of recent breakthroughs on the cryptanalysis of hash functions, the US National Institute for Standards and Technology (NIST) organized a workshop to solicit input on the current status of the Secure Hash Algorithm-1 (SHA-1) family of hash functions.
C. Rechberger, V. Rijmen, N. Sklavos
openaire +3 more sources
Requirements for cryptographic hash functions
Computers & Security, 1992We give a comprehensive discussion of and structure for the quality requirements good cryptographic hash functions should fulfil. Functional requirements like contraction of the input and fast calculation are ordered by priority in the algorithm design and implementation process.
Fritz Bauspiess, Frank Damm
openaire +1 more source
2015
Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a ...
Imad Fakhri Alshaikhli +1 more
openaire +1 more source
Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a ...
Imad Fakhri Alshaikhli +1 more
openaire +1 more source

