Results 201 to 210 of about 37,820 (242)
Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability
Shoichi Hirose
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
The rumen microbiome: balancing food security and environmental impacts
Nature Reviews Microbiology, 2021Itzhak Mizrahi, Robert Wallace
exaly
Black-Box Property of Cryptographic Hash Functions
Foundations and Practice of Security, 2011Michal Rjasko
semanticscholar +1 more source
Incremental cryptography and security of public hash functions
Tola John Odule
openalex +1 more source
Covalent Organic Frameworks: Design, Synthesis, and Functions
Chemical Reviews, 2020Keyu Geng, Ting He, Ruoyang Liu
exaly
Cryptographic Hash Functions and Some Applications to Information Security
Lisa Bromberg
openalex +1 more source
The emerging roles of circRNAs in cancer and oncology
Nature Reviews Clinical Oncology, 2021Lasse Sommer Kristensen
exaly
Mobile cloud computing security using cryptographic hash function algorithm
Muhammad Arfan
openalex +1 more source
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
International Conference on the Theory and Application of Cryptology and Information Security, 2016Rongmao Chen +5 more
semanticscholar +1 more source
Engineered biomaterials for in situ tissue regeneration
Nature Reviews Materials, 2020Akhilesh K Gaharwar +2 more
exaly

