Results 261 to 270 of about 123,825 (281)
Some of the next articles are maybe not open access.

Keyed hash function based on a dynamic lookup table of functions

Information Sciences, 2012
Yantao Li, Di Xiao, Shaojiang Deng
exaly  

Minimal Perfect Hash Functions

2014
P. Boldi, S. Vigna
openaire   +1 more source

Cryptographic Hash Functions from Expander Graphs

Journal of Cryptology, 2007
Kristin E Lauter
exaly  

Randomness testing of non-cryptographic hash functions for real-time hash table based storage and look-up of URLs

Journal of Network and Computer Applications, 2014
Tahir Bin Ahmad, Usman Younis
exaly  

Image encryption algorithm based on multiple mixed hash functions and cyclic shift

Optics and Lasers in Engineering, 2018
Xingyuan Wang   +2 more
exaly  

Dual Universality of Hash Functions and Its Applications to Quantum Cryptography

IEEE Transactions on Information Theory, 2013
Toyohiro Tsurumaru, Masahito Hayashi
exaly  

Minimal perfect hash functions made simple

Communications of the ACM, 1980
exaly  

Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures

Microprocessors and Microsystems, 2016
George S Athanasiou   +2 more
exaly  

Home - About - Disclaimer - Privacy