Results 91 to 100 of about 4,088 (185)

SAT-based preimage attacks on SHA-1

open access: yes, 2012
Hash functions are important cryptographic primitives which map arbitrarily long messages to fixed-length message digests in such a way that: (1) it is easy to compute the message digest given a message, while (2) inverting the hashing process (e.g. finding a message that maps to a specific message digest) is hard. One attack against a hash function is
openaire   +1 more source

Cryptographic Hash Functions [PDF]

open access: yes, 2009
Thomsen, Søren Steffen
core   +1 more source

Code Integrity and Confidentiality: An Active Data Approach for Active and Healthy Ageing. [PDF]

open access: yesSensors (Basel), 2023
Litvinov E   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy