Key derivation function: key-hash based computational extractor and stream based pseudorandom expander. [PDF]
Chuah CW, Harun NZ, Hamid IRA.
europepmc +1 more source
Weak-keys and key-recovery attack for [Formula: see text]. [PDF]
Dutta P, Rajasree MS, Sarkar S.
europepmc +1 more source
On the Convergence of Internet of Things and Decentralized Finance: Security Challenges and Future Directions. [PDF]
Sarasijanayanan P +2 more
europepmc +1 more source
Diversity and distribution of extracellular microcrystals in holothuroid echinoderms. [PDF]
Ma KCK, Gao F, Hamel JF, Mercier A.
europepmc +1 more source
A novel hybrid medical image encryption scheme based on memristive chaos and DNA-ARX-3DES with Real-Time implementation. [PDF]
Suzgen EE, Sahin ME, Ulutas H.
europepmc +1 more source
Big Data: Big Challenges, Big Opportunities: The Reification of Consilience [PDF]
Reed, Daniel A.
core +2 more sources
Vulnerability Evaluation and Secure Design Methodology of Cryptohardware for ASIC-embedded Secure Applications to Prevent Side-Channel Attacks [PDF]
Acosta, A. J. +3 more
core
Rudolph Virchow's Upper Silesia report: the starting point for his simultaneous engagement with public health and antisemitism. [PDF]
Sergi CM.
europepmc +1 more source
Time-motion analysis in men's breaking: A longitudinal study. [PDF]
Pérez-Portela A +5 more
europepmc +1 more source

