Results 231 to 240 of about 10,388,112 (269)
Some of the next articles are maybe not open access.
Hash-Function Based PRFs: AMAC and Its Multi-User Security
International Conference on the Theory and Application of Cryptographic Techniques, 2016M. Bellare+2 more
semanticscholar +1 more source
An optimized pipelined architecture of SHA-256 hash function
International Symposium on Embedded Computing and System Design, 2017Meelu Padhi, R. Chaudhari
semanticscholar +1 more source
Chaotic hash function based on the dynamic S-Box with variable parameters
Nonlinear dynamics, 2016Yantao Li, Guangfu Ge, Dawen Xia
semanticscholar +1 more source
A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps
, 2017Musheer Ahmad+3 more
semanticscholar +1 more source
Research on the Hash Function Structures and its Application
Wireless personal communications, 2016Yijun Yang+4 more
semanticscholar +1 more source
On the use of chaotic iterations to design keyed hash function
Cluster Computing, 2017Zhuosheng Lin+4 more
semanticscholar +1 more source
A fast and efficient hash function based on generalized chaotic mapping with variable parameters
Neural computing & applications (Print), 2016Yantao Li, Xiang Li, Xiangwei Liu
semanticscholar +1 more source
Parallel chaotic hash function based on the shuffle-exchange network
Nonlinear dynamics, 2015J. Teh, A. Samsudin, A. Akhavan
semanticscholar +1 more source
Photodynamic therapy of cancer: An update
Ca-A Cancer Journal for Clinicians, 2011Patrizia Agostinis+2 more
exaly
Information Security and Cryptography, 2015
Jean-Philippe Aumasson+3 more
semanticscholar +1 more source
Jean-Philippe Aumasson+3 more
semanticscholar +1 more source