Results 161 to 170 of about 13,015 (291)
Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
John Kelsey, Bruce Schneier
openalex +1 more source
Secure network coding with minimum overhead based on hash functions [PDF]
Majid Adeli, Huaping Liu
openalex +1 more source
Abstract This paper introduces a novel lightweight colour image encryption algorithm, specifically designed for resource‐constrained environments such as Internet of Things (IoT) devices. As IoT systems become increasingly prevalent, secure and efficient data transmission becomes crucial.
Kenan İnce, Cemile İnce, Davut Hanbay
wiley +1 more source
Cryptanalysis of Hash Functions with Structures [PDF]
Dmitry Khovratovich
openalex +1 more source
One-way Hash function based on chaotic neural network
Guangjie Liu+4 more
openalex +1 more source
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384 [PDF]
Jian Guo+4 more
openalex +1 more source
Hash functions for near duplicate image retrieval [PDF]
Adrien Auclair+2 more
openalex +1 more source
Secure and Efficient Secret Sharing Scheme Based on Wide Pipe Hash Function
Hie-Do Kim, Dongho Won
openalex +2 more sources
Balanced families of perfect hash functions and their applications [PDF]
Noga Alon, Shai Gutner
openalex +1 more source