Fast scalable construction of ([compressed] static | minimal perfect hash) functions
Marco Genuzio +2 more
openalex +1 more source
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source
Resilient cybersecurity in smart grid ICS communication using BLAKE3-driven dynamic key rotation and intrusion detection. [PDF]
Dokku NS +5 more
europepmc +1 more source
Symbolic and Explicit Search Hybrid through Perfect Hash Functions — A Case Study in Connect Four
Stefan Edelkamp +2 more
openalex +2 more sources
Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction. [PDF]
Ibrahim MM +6 more
europepmc +1 more source
Quantum secured blockchain framework for enhancing post quantum data security. [PDF]
Reddy NR +5 more
europepmc +1 more source
Provably lightweight and secure IoHT scheme with post-quantum cryptography and fog computing: A comprehensive scheme for healthcare system. [PDF]
Abood EW +4 more
europepmc +1 more source
Efficient seeding for error-prone sequences with SubseqHash2. [PDF]
Li X, Chen K, Shao M.
europepmc +1 more source
A Dickson polynomial based group key agreement authentication scheme for ensuring conditional privacy preservation and traceability in VANETs. [PDF]
Rajkumar Y, Santhosh Kumar SVN.
europepmc +1 more source
A survey of sequence-to-graph mapping algorithms in the pangenome era. [PDF]
Cui Y, Peng C, Xia Z, Yang C, Guo Y.
europepmc +1 more source

