Results 301 to 310 of about 153,790 (328)
Some of the next articles are maybe not open access.

FPGA-based implementation alternatives for the inner loop of the Secure Hash Algorithm SHA-256

Microprocessors and microsystems, 2013
I. Algredo-Badillo   +3 more
semanticscholar   +1 more source

A fault attack on a hardware-based implementation of the secure hash algorithm SHA-512

International Conference on Reconfigurable Computing and FPGAs, 2013
Abdulhadi Shoufan
semanticscholar   +1 more source

The Whale Optimization Algorithm

Advances in Engineering Software, 2016
Seyedali Mirjalili, Andrew J Lewis
exaly  

Slime mould algorithm: A new method for stochastic optimization

Future Generation Computer Systems, 2020
Hui-Ling Chen   +2 more
exaly  

Mastering the game of Go with deep neural networks and tree search

Nature, 2016
David Silver, Aja Huang, Arthur Guez
exaly  

Evolution of CLL treatment — from chemoimmunotherapy to targeted and individualized therapy

Nature Reviews Clinical Oncology, 2018
Jan A Burger, Susan M O'brien
exaly  

Home - About - Disclaimer - Privacy