Results 271 to 280 of about 147,726 (298)
Some of the next articles are maybe not open access.
An efficient fault detection scheme for the secure hash algorithm SHA-512
2017 International Conference on Green Energy Conversion Systems (GECS), 2017Fatma Kahri +3 more
semanticscholar +1 more source
Technological solutions for throughput improvement of a Secure Hash Algorithm-256 engine
International Symposium for Design and Technology in Electronic Packaging, 2017Flavius Opritoiu +2 more
semanticscholar +1 more source
With the significance of data security increasing, hashing has become a vital part of both the computer sciences and mathematical research. Even though the first secure hashing algorithm has been defined by NIST decades ago, research on the field of secure hashing algorithms is now more relevant than ever. However, the choice of which security level to
openaire +1 more source
openaire +1 more source
A compact FPGA-based processor for the Secure Hash Algorithm SHA-256
Computers & electrical engineering, 2014Rommel GarcĂa +4 more
semanticscholar +1 more source
Efficient High Speed Implementation of Secure Hash Algorithm-3 on Virtex-5 FPGA
2014 17th Euromicro Conference on Digital System Design, 2014M. Rao, T. Newe, I. Grout
semanticscholar +1 more source
Spinal Extradural Metastasis: Review of Current Treatment Options
Ca-A Cancer Journal for Clinicians, 2008Ronald H M A Bartels +2 more
exaly
Tumor-Node-Metastasis Staging of Pancreatic Adenocarcinoma
Ca-A Cancer Journal for Clinicians, 2008Matthew H G Katz
exaly

