Results 191 to 198 of about 13,790 (198)
Some of the next articles are maybe not open access.
Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack
Science China Information Sciences, 2016exaly
Implementation of Efficient Low Power SHA-256 Algorithm
2024 2nd International Conference on Networking, Embedded and Wireless Systems (ICNEWS)Komal S Kulkarni +2 more
openaire +1 more source

