Results 61 to 70 of about 343 (81)
Bijdrage Tot ed Kennis Der Noord- En Oostkusten Van Nieuw Guinea, [PDF]
v. ; 27 cm.Publication suspended Mar.
De Bruijn Kops, G.F. , Luit. ter see 2de kl.
core
Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction. [PDF]
Ibrahim MM +6 more
europepmc +1 more source
Vector Instruction Set Extensions for Efficient Computation of Keccak
Hemendra K. Rawat, P. Schaumont
semanticscholar +1 more source
Philippe Dautzenberg (Ixelles, le 20 décembre 1849 - Paris, le 9 mai 1935) [PDF]
Duchamps, R.
core
A new authenticated encryption technique for handling long ciphertexts in memory constrained devices
Megha Agrawal, D. Chang, S. K. Sanadhya
semanticscholar +1 more source
LAPORAN PRAKTIK KERJA LAPANGAN (PKL) PADA SUB BAGIAN MARKETING EVENT (PEMASARAN) DI UNIT TAMAN IMPIAN PT PEMBANGUNAN JAYA ANCOL, TBK [PDF]
LESTARI, ANANDA DWI
core
SIMD Instruction Set Extensions for Keccak with Applications to SHA-3, Keyak and Ketje
Recent processor architectures such as Intel Westmere (and later) and ARMv8 include instruction-level support for the Advanced Encryption Standard (AES), for the Secure Hashing Standard (SHA-1, SHA2) and for carry-less multiplication. These crypto-instruction sets provide specialized hardware processing at the top of the memory hierarchy, and provide ...
Hemendra K. Rawat, Patrick Schaumont
semanticscholar +3 more sources

