Results 341 to 350 of about 10,475,631 (365)
Some of the next articles are maybe not open access.
Information Security and Cryptography, 2015
Jean-Philippe Aumasson+3 more
semanticscholar +1 more source
Jean-Philippe Aumasson+3 more
semanticscholar +1 more source
Open problems in hash function security
Designs, Codes and Cryptography, 2015E. Andreeva, Bart Mennink, B. Preneel
semanticscholar +1 more source
Hash Function with Variable Output Length
2015 International Conference on Network and Information Systems for Computers, 2015Meng-jiao Wang, Yong-zhen Li
semanticscholar +1 more source
An improved attributeābased encryption technique towards the data security in cloud computing
Concurrency Computation Practice and Experience, 2019Suyel Namasudra
exaly
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015
Qi Wu
semanticscholar +1 more source
Qi Wu
semanticscholar +1 more source
Hash key-based image encryption using crossover operator and chaos
Multimedia Tools and Applications, 2016Ramzi Guesmi+2 more
exaly
LSH: A New Fast Secure Hash Function Family
International Conference on Information Security and Cryptology, 2014Dong-Chan Kim+4 more
semanticscholar +1 more source
A novel image encryption based on hash function with only two-round diffusion process
Multimedia Systems, 2013Benyamin Norouzi+3 more
semanticscholar +1 more source