Results 271 to 280 of about 147,726 (298)
Some of the next articles are maybe not open access.

An efficient fault detection scheme for the secure hash algorithm SHA-512

2017 International Conference on Green Energy Conversion Systems (GECS), 2017
Fatma Kahri   +3 more
semanticscholar   +1 more source

Technological solutions for throughput improvement of a Secure Hash Algorithm-256 engine

International Symposium for Design and Technology in Electronic Packaging, 2017
Flavius Opritoiu   +2 more
semanticscholar   +1 more source

Secure hash algorithms

With the significance of data security increasing, hashing has become a vital part of both the computer sciences and mathematical research. Even though the first secure hashing algorithm has been defined by NIST decades ago, research on the field of secure hashing algorithms is now more relevant than ever. However, the choice of which security level to
openaire   +1 more source

Head and neck cancers—major changes in the American Joint Committee on cancer eighth edition cancer staging manual

Ca-A Cancer Journal for Clinicians, 2017
William M Lydiatt   +2 more
exaly  

A compact FPGA-based processor for the Secure Hash Algorithm SHA-256

Computers & electrical engineering, 2014
Rommel GarcĂ­a   +4 more
semanticscholar   +1 more source

Efficient High Speed Implementation of Secure Hash Algorithm-3 on Virtex-5 FPGA

2014 17th Euromicro Conference on Digital System Design, 2014
M. Rao, T. Newe, I. Grout
semanticscholar   +1 more source

Spinal Extradural Metastasis: Review of Current Treatment Options

Ca-A Cancer Journal for Clinicians, 2008
Ronald H M A Bartels   +2 more
exaly  

Tumor-Node-Metastasis Staging of Pancreatic Adenocarcinoma

Ca-A Cancer Journal for Clinicians, 2008
Matthew H G Katz
exaly  

Deep learning

Nature, 2015
Yann Lecun   +2 more
exaly  

Home - About - Disclaimer - Privacy