Results 201 to 210 of about 153,790 (328)

RTL Design, Verification and Synthesis of Secure Hash Algorithm to implement on an ASIC Processor

open access: diamond, 2019
Akhilesh S Narayan   +4 more
openalex   +1 more source

Quantum secured blockchain framework for enhancing post quantum data security. [PDF]

open access: yesSci Rep
Reddy NR   +5 more
europepmc   +1 more source

Summarizing data for secure transaction: A hash algorithm

open access: yes, 2011
Hashing is a process of transforming a variable length data message into a fixed size message digest. Hashing algorithms are considered one-way functions, since the input cannot be determined from the message digests. As a security tool in data communication, hashing is used both for protecting data integrity and for authentication.
openaire   +2 more sources

Home - About - Disclaimer - Privacy