Results 301 to 310 of about 154,141 (333)
Some of the next articles are maybe not open access.
European Transactions on Telecommunications, 1994
AbstractHash functions were introduced in cryptology in the late seventies as a tool to protect the authenticity of information. Soon it became clear that they were a very useful building block to solve other security problems in telecommunication and computer networks.
openaire +2 more sources
AbstractHash functions were introduced in cryptology in the late seventies as a tool to protect the authenticity of information. Soon it became clear that they were a very useful building block to solve other security problems in telecommunication and computer networks.
openaire +2 more sources
2020
Don't get intimidated by the title of this chapter. The theory of cryptographic hash functions is not particularly abstruse. What is difficult is the construction of these functions from scratch. However, we need not concern ourselves with this aspect of the mathematical theory since most programming language libraries provide us with a good selection ...
openaire +2 more sources
Don't get intimidated by the title of this chapter. The theory of cryptographic hash functions is not particularly abstruse. What is difficult is the construction of these functions from scratch. However, we need not concern ourselves with this aspect of the mathematical theory since most programming language libraries provide us with a good selection ...
openaire +2 more sources
Instant neural graphics primitives with a multiresolution hash encoding
ACM Transactions on Graphics, 2022exaly
Secure Hash Algorithms and the Corresponding FPGA Optimization Techniques
ACM Computing Surveys, 2021Samee U Khan
exaly

