Search

Your search keyword '"Hash Function"' showing total 22,146 results

Search Constraints

Start Over You searched for: Descriptor "Hash Function" Remove constraint Descriptor: "Hash Function"
22,146 results on '"Hash Function"'

Search Results

2. New Post-quantum Crypto-algorithm Utilizing Hash Function: Applicable in Blockchain

3. An Authentication Algorithm for Sets of Spatial Data Objects

4. Simple vs. vectorial: exploiting structural symmetry to beat the ZeroSum distinguisher: Applications to SHA3, Xoodyak and Bash: Simple vs. vectorial: exploiting structural symmetry...: S. Suryawanshi et al.

5. Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA.

6. Design and Performance Evaluation of a Novel High-Speed Hardware Architecture for Keccak Crypto Coprocessor.

7. 多维背包问题的新型人类学习优化算法.

8. Blockchain Technology and Smart Contract Application in Security Management of Intelligent Chemical Plants.

9. PMA-KDP: privacy-preserving mutual authentication and key distribution protocol in Vehicular Ad-hoc Networks (VANETs).

10. Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of a Prevailing Assumption.

11. Features of Structural Hardware Transformation of Information in Cryptosystems

12. Image Encryption Algorithm Based on a Hybrid Model of Novel Memristive Hyperchaotic Systems, DNA Coding, and Hash Functions

13. A Deep Cryptographic Framework for Securing the Healthcare Network from Penetration.

14. New Approach for Online Voting Ensuring Privacy and Verifiability.

15. Enhancing Blockchain Security by Developing the SHA256 Algorithm.

16. Dynamical Investigation of a Flexible Symmetry-Breaking Cyclic Chaotic Oscillator for Biomedical Image Encryption.

17. Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants.

18. Blockchain and Cryptography Framework of E-Apps with Big Data.

19. Improved homomorphic evaluation for hash function based on TFHE

20. Preimage attacks on reduced-round Ascon-Xof.

21. Secure, light‐weight and dynamic PUF‐based mutual device authentication mechanism in industrial IoT networks.

22. ENR DigiSig: an efficient post-quantum digital signature scheme using polar codes.

23. N -Dimensional Non-Degenerate Chaos Based on Two-Parameter Gain with Application to Hash Function.

24. Improved homomorphic evaluation for hash function based on TFHE.

25. Utilization of Blockchain Technology in the Data Audit System of Power Grid Engineering.

26. Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance.

28. Intelligent Hash Function Based Key-Exchange Scheme for Ocean Underwater Data Transmission

29. EKRM: Efficient Key-Value Retrieval Method to Reduce Data Lookup Overhead for Redis

31. Generic MitM Attack Frameworks on Sponge Constructions

32. Efficient Energy Consumption of IoT Network Security Based on Symmetric and Asymmetric Cryptography and Hash Function

33. Interactive Learning for Patient Care: Blockchain Ingrained Electronic Health Record Management System with Patient Control, Data Quality and Security Assurance

34. A Comparison of Lightweight Cryptographic Algorithms

35. Algorithm of Generating One-Time Passwords for Two-Factor Authentication of Users

37. Revocable policy-based chameleon hash using lattices

38. Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations

39. Efficient and Secure Color Image Encryption System with Enhanced Speed and Robustness Based on Binary Tree

40. Comparative Study of Blockchain Hashing Algorithms with a Proposal for HashLEA

42. Quantum implementation of SHA1 and MD5 and comparison with classical algorithms.

43. 蜂窝物联网匿名访问用户身份认证算法.

44. Image encryption algorithm based on face recognition, facial features recognition and bitonic sequence.

45. New Integral Distinguishers On Permutation Of Whirlpool.

46. UniHaCh: Unicode and Hash Function Supported with Counting and Frequency Recurrence of Arabic Characters for Quranic Text Watermarking.

47. Quantum-Secure N2N Authentication Protocol Model for IoT Sensor Networks.

48. Parallel Implementation of Lightweight Secure Hash Algorithm on CPU and GPU Environments.

49. A Practical Recovery Mechanism for Blockchain Hardware Wallets

50. A Stable Hash Function Based on Parity-Dependent Quantum Walks With Memory (August 2023)

Catalog

Books, media, physical & digital resources