Results 201 to 210 of about 11,893 (260)
A Survey on Proof of Sequential Work: Development, Security Analysis, and Application Prospects. [PDF]
Zhang J +7 more
europepmc +1 more source
Kademlia hash snow ablation resource optimized stride scheduling for mobile computing services in healthcare sector. [PDF]
Sivakumar NR.
europepmc +1 more source
Security of Quantum Key Distribution with One-Time-Pad-Protected Error Correction and Its Performance Benefits. [PDF]
Novak R.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Journal of the ACM, 1999
Consider the set ℋ of all linear (or affine) transformations between two vector spaces over a finite field F . We study how good ℋ is as a class of hash functions, namely we consider hashing a set S of size n into a range having the same cardinality n
Alon, Noga +4 more
openaire +2 more sources
Consider the set ℋ of all linear (or affine) transformations between two vector spaces over a finite field F . We study how good ℋ is as a class of hash functions, namely we consider hashing a set S of size n into a range having the same cardinality n
Alon, Noga +4 more
openaire +2 more sources
Cryptologia, 2019
GOST-R 34.11-94 is a Russian standard cryptographic hash function that was introduced in 1994 by the Russian Federal Agency for the purposes of information processing, information security, and dig...
Khushboo Bussi +3 more
openaire +1 more source
GOST-R 34.11-94 is a Russian standard cryptographic hash function that was introduced in 1994 by the Russian Federal Agency for the purposes of information processing, information security, and dig...
Khushboo Bussi +3 more
openaire +1 more source
2021
So far we have studied various hash function properties as well as use cases of hash functions. When unkeyed or used with a public key, hash functions can be collision resistant, second-preimage resistant, or one-way.
Arno Mittelbach, Marc Fischlin
openaire +1 more source
So far we have studied various hash function properties as well as use cases of hash functions. When unkeyed or used with a public key, hash functions can be collision resistant, second-preimage resistant, or one-way.
Arno Mittelbach, Marc Fischlin
openaire +1 more source
Journal of Information and Optimization Sciences, 2001
RC6 was a candidate encryption algorithm for AES selections which emphasizes on the security, simplicity and performance of the algorithm. The round keys of RC6 are generated from the input key words by a certain amount of “one-way” according to the authors’ claims.
Yi-Shiung Yeh, Jue-Sam Chou
openaire +1 more source
RC6 was a candidate encryption algorithm for AES selections which emphasizes on the security, simplicity and performance of the algorithm. The round keys of RC6 are generated from the input key words by a certain amount of “one-way” according to the authors’ claims.
Yi-Shiung Yeh, Jue-Sam Chou
openaire +1 more source
Cryptographic Hash Functions [PDF]
Kryptografiske hashfunktioner anvendes i mange forskellige områder inden for kryptografi: i digitale signatursystemer og i såkaldt public‐key kryptografi, til passwordbeskyttelse og autentificering af beskeder, til dannelse af kryptografiske nøgler og tilfældige tal, osv.
openaire +2 more sources

