Results 171 to 180 of about 2,695,884 (227)
Some of the next articles are maybe not open access.
Low-Complexity Cryptographic Hash Functions
Information Technology Convergence and Services, 2017Cryptographic hash functions are efficiently computable functions that shrink a long input into a shorter output while achieving some of the useful security properties of a random function.
Benny Applebaum+4 more
semanticscholar +1 more source
High speed calculation of cryptographic hash functions by CNN chips
1998 Fifth IEEE International Workshop on Cellular Neural Networks and their Applications. Proceedings (Cat. No.98TH8359), 1998The paper is concerned with the implementation of cryptographic hash functions on the regular array of simple cellular neural network (CNN) cells with periodic boundary conditions.
M. Csapodi, J. Vandewalle, T. Roska
semanticscholar +1 more source
High frequency implementation of cryptographic hash function Keccak-512 on FPGA devices
International Journal of Information and Computer Security, 2018Cryptographic hash functions have an important role in numerous cryptographic mechanisms like computing digital signatures, checking data integrity, storing passwords and generating random numbers. Due to the cryptanalysis attacks on hash functions, NIST
Soufiane El Moumni+2 more
semanticscholar +1 more source
H2B: Crypto Hash Functions Based on Hybrid Ring Generators
IEEE Transactions on Computer-Aided Design of Integrated Circuits and SystemsProtection of integrated circuits (ICs) against hardware security threats has been tackled by many schemes proposed to mitigate risks associated with an unauthorized access and usage of ICs in general, and intellectual property (IP) cores in particular ...
J. Rajski+3 more
semanticscholar +1 more source
Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions
IACR Cryptology ePrint Archive, 2023Cody R. Freitag+2 more
semanticscholar +1 more source
Advances and Open Problems in Federated Learning
Foundations and Trends in Machine Learning, 2021Han Yu, Ana Cecilia Boetto
exaly
Novel cryptographic hash function based on multiple compressive parallel structures
Soft Computing - A Fusion of Foundations, Methodologies and Applications, 2022Yijun Yang+4 more
semanticscholar +1 more source
Some Observations on the Theory of Cryptographic Hash Functions
Des. Codes Cryptogr., 2006Douglas R Stinson
semanticscholar +1 more source
Property-Preserving Hash Functions for Hamming Distance from Standard Assumptions
International Conference on the Theory and Application of Cryptographic Techniques, 2022Nils Fleischhacker+2 more
semanticscholar +1 more source
Practical Homomorphic Evaluation of Block-Cipher-Based Hash Functions with Applications
Foundations and Practice of Security, 2022Adda-Akram Bendoukha+4 more
semanticscholar +1 more source