Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction. [PDF]
Ibrahim MM+6 more
europepmc +1 more source
RabbitSketch: a high-performance sketching library for genome analysis. [PDF]
Zhang T+7 more
europepmc +1 more source
Pseudorandom Numbers and Hash Functions from Iterations of Multivariate Polynomials
Alina Ostafe, Igor E. Shparlinski
openalex +2 more sources
Blockchain-Based Information Security Protection Mechanism for the Traceability of Intellectual Property Transactions. [PDF]
Wang Z+5 more
europepmc +1 more source
GPU Exploration of Two-Player Games with Perfect Hash Functions
Stefan Edelkamp+2 more
openalex +2 more sources
A method for designing Hash function based on chaotic neural network [PDF]
Bo He, Peng Lei, Pu Qin, Zhaolong Liu
openalex +1 more source
DeCoTa: a lightweight decentralized cross-chain transfer scheme based on hash-locking. [PDF]
Zou H, Sun H, Chen S, Ren W, Zheng X.
europepmc +1 more source
A task decomposition and scheduling model for power IoT data acquisition with overlapping data efficiency optimization. [PDF]
Cui J, Wang Y, Zhu Z, Li R.
europepmc +1 more source