Results 121 to 130 of about 10,388,112 (269)
Novel Duplicate Address Detection with Hash Function. [PDF]
Song G, Ji Z.
europepmc +1 more source
Cryptanalysis of Hash Functions with Structures [PDF]
Dmitry Khovratovich
openalex +1 more source
Security enhanced multi-factor biometric authentication scheme using bio-hash function. [PDF]
Choi Y, Lee Y, Moon J, Won D.
europepmc +1 more source
One-way Hash function based on chaotic neural network
Guangjie Liu+4 more
openalex +1 more source
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384 [PDF]
Jian Guo+4 more
openalex +1 more source
Hash functions in Cryptography
This thesis is concerned with giving both an overview of the application of hash functions in cryptography and a presentation of today's standard cryptographic hash functions. Cryptographic hash functions are a valuable tool in cryptography. They are applied in many areas of information security to provide protection of the authenticity of messages ...
openaire +1 more source
Hyperchaotic hashing: a chaotic hash function based on 2D linear cross-coupled map with parallel feedback structure. [PDF]
Xing H, Min R, Li S, Yang Z, Yang Y.
europepmc +1 more source
Hash functions for near duplicate image retrieval [PDF]
Adrien Auclair+2 more
openalex +1 more source
Blockchain for video watermarking: An enhanced copyright protection approach for video forensics based on perceptual hash function. [PDF]
Darwish SM, Abu-Deif MM, Elkaffas SM.
europepmc +1 more source