Results 171 to 180 of about 2,695,884 (227)
Some of the next articles are maybe not open access.

Low-Complexity Cryptographic Hash Functions

Information Technology Convergence and Services, 2017
Cryptographic hash functions are efficiently computable functions that shrink a long input into a shorter output while achieving some of the useful security properties of a random function.
Benny Applebaum   +4 more
semanticscholar   +1 more source

High speed calculation of cryptographic hash functions by CNN chips

1998 Fifth IEEE International Workshop on Cellular Neural Networks and their Applications. Proceedings (Cat. No.98TH8359), 1998
The paper is concerned with the implementation of cryptographic hash functions on the regular array of simple cellular neural network (CNN) cells with periodic boundary conditions.
M. Csapodi, J. Vandewalle, T. Roska
semanticscholar   +1 more source

High frequency implementation of cryptographic hash function Keccak-512 on FPGA devices

International Journal of Information and Computer Security, 2018
Cryptographic hash functions have an important role in numerous cryptographic mechanisms like computing digital signatures, checking data integrity, storing passwords and generating random numbers. Due to the cryptanalysis attacks on hash functions, NIST
Soufiane El Moumni   +2 more
semanticscholar   +1 more source

H2B: Crypto Hash Functions Based on Hybrid Ring Generators

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Protection of integrated circuits (ICs) against hardware security threats has been tackled by many schemes proposed to mitigate risks associated with an unauthorized access and usage of ICs in general, and intellectual property (IP) cores in particular ...
J. Rajski   +3 more
semanticscholar   +1 more source

Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions

IACR Cryptology ePrint Archive, 2023
Cody R. Freitag   +2 more
semanticscholar   +1 more source

Advances and Open Problems in Federated Learning

Foundations and Trends in Machine Learning, 2021
Han Yu, Ana Cecilia Boetto
exaly  

Novel cryptographic hash function based on multiple compressive parallel structures

Soft Computing - A Fusion of Foundations, Methodologies and Applications, 2022
Yijun Yang   +4 more
semanticscholar   +1 more source

Property-Preserving Hash Functions for Hamming Distance from Standard Assumptions

International Conference on the Theory and Application of Cryptographic Techniques, 2022
Nils Fleischhacker   +2 more
semanticscholar   +1 more source

Practical Homomorphic Evaluation of Block-Cipher-Based Hash Functions with Applications

Foundations and Practice of Security, 2022
Adda-Akram Bendoukha   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy