Search

Your search keyword '"Hash Function"' showing total 22,150 results

Search Constraints

Start Over You searched for: Descriptor "Hash Function" Remove constraint Descriptor: "Hash Function"
22,150 results on '"Hash Function"'

Search Results

151. A Novel Hash Function Based on Multi-iterative Parallel Structure.

152. An Efficient Diffusion Approach for Chaos-Based Image Encryption and DNA Sequences.

153. Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions.

154. Message-Restriction-Free Commitment Scheme Based on Lattice Assumption

156. Towards Quantum Large-Scale Password Guessing on Real-World Distributions

157. Algebraic Attacks on Round-Reduced Keccak

158. Turn-Based Communication Channels

160. Research on Normalized Network Information Storage Method Based on Deep Reinforcement Learning

161. Secured Surveillance Storage Model Using Blockchain

162. IoT-Based Secure Communication to Enhance Blockchain Model

164. Securing the Storage of Passwords Based on the MD5 HASH Transformation

165. Significance and Impact of Blockchain Technology in Education System

166. Homomorphic Password Manager Using Multiple-Hash with PUF

167. Software Proof Security Mechanism Based on Internet of Things Network Security

168. Verifiable Multi-use Multi-secret Sharing Scheme on Monotone Span Program

169. Evaluation of Confidentiality and Data Integrity Based on User Session for IoT Environment

170. Improvement of Merkle Signature Scheme by Means of Optical Quantum Random Number Generators

171. Improved Post-quantum Merkle Algorithm Based on Threads

172. Design of Hash Function Using Two Dimensional Cellular Automata

173. Security Analysis of Even-Mansour Structure Hash Functions

174. Quantum Collision Attacks on Reduced SHA-256 and SHA-512

175. HVH: A Lightweight Hash Function Based on Dual Pseudo-Random Transformation

176. Hash Function Based on Controlled Alternate Quantum Walks With Memory (September 2021)

177. Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications

180. A Novel Color Image Encryption Algorithm Using Coupled Map Lattice with Polymorphic Mapping.

181. Differential Analysis of a Cryptographic Hashing Algorithm HBC-256.

182. IoT privacy preservation using blockchain.

183. A Cache Efficient One Hashing Blocked Bloom Filter (OHBB) for Random Strings and the K-mer Strings in DNA Sequence.

184. Cloud Computation-Based Clustering Method for Nonlinear Complex Attribute Big Data.

185. Homoglyph Attack Detection Model Using Machine Learning and Hash Function.

186. A Robust Two-Factor User Authentication Scheme-Based ECC for Smart Home in IoT.

188. An efficient and secure technique for image steganography using a hash function

189. Integrity of virtual testing for crash protection

190. Example of internal function for Sponge scheme built on the basis of the generalized AES design methodology

191. HashGAT-VCA: A vector cellular automata model with hash function and graph attention network for urban land-use change simulation.

192. Efficient and Secure Color Image Encryption System with Enhanced Speed and Robustness Based on Binary Tree.

193. A Method of Data Integrity Check and Repair in Big Data Storage Platform

194. GDozenHash Hash Function Based on Three-Dimensional Stochastic Transformations

195. Permission Based Access Control for Healthcare Systems

196. A Novel Invisible Watermarking Approach for Double Authentication of Image Content

197. The Trojan Message Attack on the Pay-to-Public-Key-Hash Protocol of Bitcoin

198. Cancellable Face Biometrics Template Using AlexNet

199. Blind Transfer of Personal Data Achieving Privacy

200. Secure Data Transfer Through Whirlpool—A Miyaguchi-Preneel Mode

Catalog

Books, media, physical & digital resources