Results 131 to 140 of about 3,739 (238)
Security of the SHA-3 Candidates Keccak and Blue Midnight Wish: Zero-sum Property
Liliya Andreicheva
openalex +2 more sources
KangarooTwelve: Fast Hashing Based on KECCAK-p
Contains fulltext : 195384.pdf (Publisher’s version ) (Open Access)
Bertoni, G. +5 more
openaire +1 more source
A Novel Approach for Ticket Generation and Validation Using RSA and Keccak Algorithms
Rachna K Somkunwar +2 more
semanticscholar +1 more source
A Lightweight Hash Function Based on Enhanced Chaotic Map Algorithm(Keccak) [PDF]
Yusra Ghareeb, Ekhlas Khalaf Gbashi
openalex +1 more source
An image cryptography method by highly error-prone DNA storage channel. [PDF]
Zan X +6 more
europepmc +1 more source
Entropy Sources Based on Silicon Chips: True Random Number Generator and Physical Unclonable Function. [PDF]
Cao Y +7 more
europepmc +1 more source
Retraction Note to: IoT based home monitoring system with secure data storage by Keccak–Chaotic sequence in cloud server [PDF]
S. Ravikumar, D. Kavitha
openalex +1 more source

