Results 211 to 220 of about 37,820 (242)
Cryptography & Network Security Hash Function Applications, Attacks and Advances: A Review
Arvind K. Sharma, S. K. Mittal
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Covalent organic frameworks: a materials platform for structural and functional designs
Nature Reviews Materials, 2016Ningjian Huang, Donglin Jiang
exaly
An Efficient Lightweight Cryptography Tiny Hash Function for Data Security in IoT Applications
openalex +1 more source
Cryptographic Hash Functions and Expander Graphs: The End of the Story?
The New Codebreakers, 2015C. Petit, J. Quisquater
semanticscholar +1 more source
The expanding regulatory mechanisms and cellular functions of circular RNAs
Nature Reviews Molecular Cell Biology, 2020Ling-Ling Chen
exaly
Bad directions in cryptographic hash functions
IACR Cryptology ePrint Archive, 2015D. Bernstein +3 more
semanticscholar +1 more source
Rethinking cancer nanotheranostics
Nature Reviews Materials, 2017Hongmin Chen, Weizhong Zhang, Guizhi Zhu
exaly
High frequency implementation of cryptographic hash function Keccak-512 on FPGA devices
International Journal of Information and Computer Security, 2018Soufiane El Moumni +2 more
semanticscholar +1 more source

