Results 341 to 350 of about 10,475,631 (365)
Some of the next articles are maybe not open access.

The Hash Function BLAKE

Information Security and Cryptography, 2015
Jean-Philippe Aumasson   +3 more
semanticscholar   +1 more source

Open problems in hash function security

Designs, Codes and Cryptography, 2015
E. Andreeva, Bart Mennink, B. Preneel
semanticscholar   +1 more source

Hash Function with Variable Output Length

2015 International Conference on Network and Information Systems for Computers, 2015
Meng-jiao Wang, Yong-zhen Li
semanticscholar   +1 more source

An improved attribute‐based encryption technique towards the data security in cloud computing

Concurrency Computation Practice and Experience, 2019
Suyel Namasudra
exaly  

A Chaos-Based Hash Function

International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015
Qi Wu
semanticscholar   +1 more source

Hash key-based image encryption using crossover operator and chaos

Multimedia Tools and Applications, 2016
Ramzi Guesmi   +2 more
exaly  

LSH: A New Fast Secure Hash Function Family

International Conference on Information Security and Cryptology, 2014
Dong-Chan Kim   +4 more
semanticscholar   +1 more source

Minimal Perfect Hash Functions

2014
P. Boldi, S. Vigna
openaire   +1 more source

A novel image encryption based on hash function with only two-round diffusion process

Multimedia Systems, 2013
Benyamin Norouzi   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy