Results 181 to 190 of about 36,351 (194)
Some of the next articles are maybe not open access.
Performance of the most common non-cryptographic hash functions
Software - Practice and Experience, 2014Yago Saez, Gustavo Recio, P. Isasi
exaly
Efficient chameleon hash functions in the enhanced collision resistant model
Information Sciences, 2020Mohammad Dakhilalian, Willy Susilo
exaly
LOCHA: A Light-weight One-way Cryptographic Hash Algorithm for Wireless Sensor Network
Procedia Computer Science, 2014Amrita Roy Chowdhury +2 more
exaly
Evolutionary hash functions for specific domains
Applied Soft Computing Journal, 2019Yago Saez, David Quintana, P. Isasi
exaly
Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures
Microprocessors and Microsystems, 2016George S Athanasiou +2 more
exaly
INTERNATIONALLY STANDARDIZED EFFICIENT CRYPTOGRAPHIC HASH FUNCTION
Proceedings of the International Conference on Security and Cryptography, 2011openaire +1 more source

