Search

Your search keyword '"Hash function"' showing total 22,114 results

Search Constraints

Start Over You searched for: Descriptor "Hash function" Remove constraint Descriptor: "Hash function"
22,114 results on '"Hash function"'

Search Results

1. New Post-quantum Crypto-algorithm Utilizing Hash Function: Applicable in Blockchain

2. An Authentication Algorithm for Sets of Spatial Data Objects

3. A Deep Cryptographic Framework for Securing the Healthcare Network from Penetration.

4. New Approach for Online Voting Ensuring Privacy and Verifiability.

5. Dynamical Investigation of a Flexible Symmetry-Breaking Cyclic Chaotic Oscillator for Biomedical Image Encryption.

6. Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants.

7. Blockchain and Cryptography Framework of E-Apps with Big Data.

8. Image Encryption Algorithm Based on a Hybrid Model of Novel Memristive Hyperchaotic Systems, DNA Coding, and Hash Functions

9. Design and Performance Evaluation of a Novel High-Speed Hardware Architecture for Keccak Crypto Coprocessor.

10. Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of a Prevailing Assumption.

11. Improved homomorphic evaluation for hash function based on TFHE

12. Preimage attacks on reduced-round Ascon-Xof.

13. ENR DigiSig: an efficient post-quantum digital signature scheme using polar codes.

14. Secure, light‐weight and dynamic PUF‐based mutual device authentication mechanism in industrial IoT networks.

15. Improved homomorphic evaluation for hash function based on TFHE.

16. N -Dimensional Non-Degenerate Chaos Based on Two-Parameter Gain with Application to Hash Function.

17. Utilization of Blockchain Technology in the Data Audit System of Power Grid Engineering.

18. Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance.

19. Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations

20. Efficient and Secure Color Image Encryption System with Enhanced Speed and Robustness Based on Binary Tree

21. Intelligent Hash Function Based Key-Exchange Scheme for Ocean Underwater Data Transmission

22. EKRM: Efficient Key-Value Retrieval Method to Reduce Data Lookup Overhead for Redis

24. Generic MitM Attack Frameworks on Sponge Constructions

25. Efficient Energy Consumption of IoT Network Security Based on Symmetric and Asymmetric Cryptography and Hash Function

26. Interactive Learning for Patient Care: Blockchain Ingrained Electronic Health Record Management System with Patient Control, Data Quality and Security Assurance

27. A Comparison of Lightweight Cryptographic Algorithms

28. Algorithm of Generating One-Time Passwords for Two-Factor Authentication of Users

31. Quantum implementation of SHA1 and MD5 and comparison with classical algorithms.

32. 蜂窝物联网匿名访问用户身份认证算法.

33. Image encryption algorithm based on face recognition, facial features recognition and bitonic sequence.

34. UniHaCh: Unicode and Hash Function Supported with Counting and Frequency Recurrence of Arabic Characters for Quranic Text Watermarking.

35. Quantum-Secure N2N Authentication Protocol Model for IoT Sensor Networks.

36. New Integral Distinguishers On Permutation Of Whirlpool.

37. Parallel Implementation of Lightweight Secure Hash Algorithm on CPU and GPU Environments.

38. A Stable Hash Function Based on Parity-Dependent Quantum Walks With Memory (August 2023)

39. RETRACTED ARTICLE: Improved RFID mutual authentication protocol against exhaustive attack in the context of big data

40. Physical layer authentication of MIMO-STBC systems based on constellation dithering

41. A Deep Cryptographic Framework for Securing the Healthcare Network from Penetration

42. Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants

43. 新形态对称密码算法研究.

44. A fast selective encryption scheme for H.264/AVC video with syntax-preserving and zero bit rate expansion.

45. Improved RFID mutual authentication protocol against exhaustive attack in the context of big data.

46. Fault-tolerant and error-correcting 4-bit S-boxes for cryptography applications with multiple errors detection.

47. Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design.

48. Development of a New Post-Quantum Digital Signature Algorithm: Syrga-1.

49. Evolutionary-based image encryption using Magic Square Chaotic algorithm and RNA codons truth table.

50. Novel image compression-then-encryption scheme based on 2D cross coupled map lattice and compressive sensing.

Catalog

Books, media, physical & digital resources