Results 71 to 80 of about 123,105 (127)
Hash functions for near duplicate image retrieval [PDF]
Adrien Auclair+2 more
openalex +1 more source
Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
John Kelsey, Bruce Schneier
openalex +1 more source
Secure network coding with minimum overhead based on hash functions [PDF]
Majid Adeli, Huaping Liu
openalex +1 more source
Cryptanalysis of Hash Functions with Structures [PDF]
Dmitry Khovratovich
openalex +1 more source
One-way Hash function based on chaotic neural network
Guangjie Liu+4 more
openalex +1 more source
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384 [PDF]
Jian Guo+4 more
openalex +1 more source
Secure and Efficient Secret Sharing Scheme Based on Wide Pipe Hash Function
Hie-Do Kim, Dongho Won
openalex +2 more sources
Balanced families of perfect hash functions and their applications [PDF]
Noga Alon, Shai Gutner
openalex +1 more source
Hash Functions for Diagnostic Information Reduction
V. B. Goldshteyn, С. В. Миронов
openalex +1 more source