Results 111 to 120 of about 2,808 (186)

BIoT-Chain: a hyperledger blockchain cloud framework with SHA-3 keccak-enabled privacy for robust drone IoT network security

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
The robust development in the technology of Drone-enabled Internet of Things (DIoT) infrastructure has revolutionized major fields of disaster management, real-time surveillance, agricultural activities, and smart city management.
Abdullah Ayub Khan   +5 more
doaj   +1 more source

KangarooTwelve: Fast Hashing Based on KECCAK-p

open access: yes, 2018
Contains fulltext : 195384.pdf (Publisher’s version ) (Open Access)
Bertoni, G.   +5 more
openaire   +1 more source

Efficient implementation of code-based identification/signatures schemes

open access: yes, 2011
International audienceIn this paper we present efficient implementations of several code-based identification schemes, namely the Stern scheme, the Véron scheme and the Cayrel-Véron-El Yousfi scheme.
Cayrel, Pierre-Louis   +4 more
core   +1 more source

Performances of Cryptographic Accumulators

open access: yes, 2014
International audienceCryptographic accumulators are space/time efficient data structures used to verify if a value belongs to a set. They have found many applications in networking and distributed systems since their in- troduction by Benaloh and de ...
Kumar, Amrit   +2 more
core  

An image cryptography method by highly error-prone DNA storage channel. [PDF]

open access: yesFront Bioeng Biotechnol, 2023
Zan X   +6 more
europepmc   +1 more source

Editorial. [PDF]

open access: yesInt J Inf Technol, 2023
Hoda MN.
europepmc   +1 more source

A High-Entropy True Random Number Generator with Keccak Conditioning for FPGA. [PDF]

open access: yesSensors (Basel)
Piscopo V   +4 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy