Results 151 to 160 of about 3,739 (238)

Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network. [PDF]

open access: yesEntropy (Basel), 2020
Abdoun N   +5 more
europepmc   +1 more source

Blockchain-Modeled Edge-Computing-Based Smart Home Monitoring System with Energy Usage Prediction. [PDF]

open access: yesSensors (Basel), 2023
Iqbal F   +6 more
europepmc   +1 more source

Implementation of high speed hash function Keccak on GPU

open access: diamond, 2019
Thuong Nguyen Dat   +3 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy