Results 321 to 330 of about 10,475,631 (365)
Some of the next articles are maybe not open access.
Secure Hash Function Constructing for Future Communication Systems and Networks
Advances in Artificial Systems for Medicine and Education II, 2018S. Gnatyuk+5 more
semanticscholar +1 more source
Introduction to Cryptography, 2018
Sahadeo Padhye, R. Sahu, V. Saraswat
semanticscholar +1 more source
Sahadeo Padhye, R. Sahu, V. Saraswat
semanticscholar +1 more source
Hash-Function Based PRFs: AMAC and Its Multi-User Security
International Conference on the Theory and Application of Cryptographic Techniques, 2016M. Bellare+2 more
semanticscholar +1 more source
Universal Hash-Function Families: From Hashing to Authentication
2014Due to their potential use as building blocks for constructing highly efficient message authentication codes (MACs), universal hash-function families have been attracting increasing research attention, both from the design and analysis points of view.
openaire +2 more sources
Data Query Mechanism Based on Hash Computing Power of Blockchain in Internet of Things
Sensors, 2020Yongjun Ren, Jin Wang, Osama AlFarraj
exaly
An optimized pipelined architecture of SHA-256 hash function
International Symposium on Embedded Computing and System Design, 2017Meelu Padhi, R. Chaudhari
semanticscholar +1 more source
Chaotic hash function based on the dynamic S-Box with variable parameters
Nonlinear dynamics, 2016Yantao Li, Guangfu Ge, Dawen Xia
semanticscholar +1 more source