Results 181 to 190 of about 36,351 (194)
Some of the next articles are maybe not open access.

Randomness testing of non-cryptographic hash functions for real-time hash table based storage and look-up of URLs

Journal of Network and Computer Applications, 2014
Tahir Bin Ahmad, Usman Younis
exaly  

Performance of the most common non-cryptographic hash functions

Software - Practice and Experience, 2014
Yago Saez, Gustavo Recio, P. Isasi
exaly  

Efficient chameleon hash functions in the enhanced collision resistant model

Information Sciences, 2020
Mohammad Dakhilalian, Willy Susilo
exaly  

LOCHA: A Light-weight One-way Cryptographic Hash Algorithm for Wireless Sensor Network

Procedia Computer Science, 2014
Amrita Roy Chowdhury   +2 more
exaly  

Evolutionary hash functions for specific domains

Applied Soft Computing Journal, 2019
Yago Saez, David Quintana, P. Isasi
exaly  

Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures

Microprocessors and Microsystems, 2016
George S Athanasiou   +2 more
exaly  

INTERNATIONALLY STANDARDIZED EFFICIENT CRYPTOGRAPHIC HASH FUNCTION

Proceedings of the International Conference on Security and Cryptography, 2011
openaire   +1 more source

Home - About - Disclaimer - Privacy