Search alternatives:
"hash function" » "has function" (Expand Search), "ash function" (Expand Search)
"hash function" » "has function" (Expand Search), "ash function" (Expand Search)
-
1
One-way hash function with chaotic dynamic parameters
Published 2008-01-01Subjects: “…hash function…”
Get full text
Article -
2
One-way hash function with chaotic dynamic parameters
Published 2008-01-01Subjects: “…hash function;chaos;dynamic parameter…”
Get full text
Article -
3
Breaking novel and lightweight digital <sub>s</sub> ignature scheme
Published 2013-07-01Subjects: “…digital signature;hash function;cryptanalysis…”
Get full text
Article -
4
Revocable policy-based chameleon hash using lattices
Published 2024-11-01Subjects: Get full text
Article -
5
Extended integer tent maps and dynamic hash function
Published 2010-01-01Subjects: “…hash function…”
Get full text
Article -
6
Secure Parallel Image Cryptographic Hash Function Using a Novel 2D High-Randomness Hyperchaotic Map
Published 2025-06-01Subjects: Get full text
Article -
7
A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase
Published 2023-01-01Subjects: Get full text
Article -
8
Cryptanalysis of some chaos-based keyed hash functions
Published 2011-01-01Subjects: “…chaos;keyed hash function;forgery;key recovery…”
Get full text
Article -
9
Reducing Power of BLAKE3 implementations with dedicated FPGA resources
Published 2025-07-01Subjects: “…cryptographic hash function…”
Get full text
Article -
10
Implementation of a Data-Parallel Approach on a Lightweight Hash Function for IoT Devices
Published 2025-02-01Subjects: Get full text
Article -
11
Design keyed Hash function based on couple chaotic system
Published 2006-01-01Subjects: Get full text
Article -
12
Secure password-based authentication scheme with anonymous identity without smart cards
Published 2008-01-01Subjects: Get full text
Article -
13
Duplicate elimination algorithm for data streams with SKIP Bloom filter
Published 2012-02-01Subjects: Get full text
Article -
14
-
15
Enhancing Internet of Things security in healthcare using a blockchain-driven lightweight hashing system
Published 2025-05-01Subjects: Get full text
Article -
16
Mechanism for data recovery as a result of data corruption, infection and/or unauthorized modification
Published 2025-04-01Subjects: Get full text
Article -
17
Hyperchaotic hashing: a chaotic hash function based on 2D linear cross-coupled map with parallel feedback structure
Published 2025-02-01Subjects: Get full text
Article -
18
Corrigendum to Fast AES-Based Universal Hash Functions and MACs
Published 2025-03-01Subjects: “…Universal hash function…”
Get full text
Article -
19
Secure password-based authentication scheme with anonymous identity without smart cards
Published 2008-01-01Subjects: “…password;password authentication;hash function;attack;smart card…”
Get full text
Article -
20
ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS
Published 2019-06-01Subjects: “…cryptographic hash function sha-1…”
Get full text
Article