Results 61 to 70 of about 10,475,631 (365)

One-way hash function with chaotic dynamic parameters

open access: yesTongxin xuebao, 2008
A novel keyed one-way hash function based on chaotic dynamic parameters was presented which combines the advantage of both chaotic system and conventional one-way hash function.In the proposed approach the fixed parameters of conventional hash function ...
GUO Wei1   +3 more
doaj   +2 more sources

Comparison of hash function algorithms against attacks: A review

open access: yes, 2018
Hash functions are considered key components of nearly all cryptographic protocols, as well as of many security applications such as message authentication codes, data integrity, password storage, and random number generation.
Ali Maetouq   +5 more
semanticscholar   +1 more source

Illuminating Advances in Materials: Optical Physical Unclonable Functions for Security Applications

open access: yesAdvanced Optical Materials, EarlyView.
This review highlights Optical Physical Unclonable Functions (OPUFs) as secure, light‐driven authentication tools. It surveys material platforms including optical fibers, low‐dimensional materials, luminophores, plasmonic nanoparticles and rare earth OPUFs systems.
Syeda Ramsha Ali   +4 more
wiley   +1 more source

The Usefulness of Multilevel Hash Tables with Multiple Hash Functions in Large Databases [PDF]

open access: yes, 2009
In this work, attempt is made to select three good hash functions which uniformly distribute hash values that permute their internal states and allow the input bits to generate different output bits.
Akinwale, A. T., Ibharalu, F. T.
core   +1 more source

Leftover Hashing Against Quantum Side Information

open access: yes, 2010
The Leftover Hash Lemma states that the output of a two-universal hash function applied to an input with sufficiently high entropy is almost uniformly random.
Renner, Renato   +3 more
core   +1 more source

Advanced Microfluidics for Single Cell‐Based Cancer Research

open access: yesAdvanced Science, EarlyView.
Cutting‐edge microfluidic platforms are transforming single‐cell cancer research. This review highlights advanced technologies, from droplet microfluidics to tumour‐chips, that enable functional and spatial single‐cell analyses. By integrating biosensing, immune components, and patient‐derived materials, these systems offer new insights into tumour ...
Adriana Carneiro   +10 more
wiley   +1 more source

Hashing with binary autoencoders

open access: yes, 2015
An attractive approach for fast search in image databases is binary hashing, where each high-dimensional, real-valued image is mapped onto a low-dimensional, binary vector and the search is done in this binary space.
Carreira-Perpiñán, Miguel Á.   +1 more
core   +1 more source

The breaking of the AR Hash Function [PDF]

open access: yesDAIMI Report Series, 1993
<p>The AR hash function has been proposed by <em> Algorithmic Research Ltd</em>. It has been circulated in the ISO community (Working group 2, document WG2/N179), and is currently being used in practice in the German banking world. AR hash is based on DES and a variant of the CBC mode.
Damgård, Ivan Bjerre   +1 more
openaire   +5 more sources

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Finding state-of-the-art non-cryptographic hashes with genetic programming [PDF]

open access: yes, 2006
Proceding of: 9th International Conference, Reykjavik, Iceland, September 9-13, 2006.The design of non-cryptographic hash functions by means of evolutionary computation is a relatively new and unexplored problem.
Estébanez Tascón, César   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy