Suggested Topics within your search.
Suggested Topics within your search.
Block codes
2
Comparative analyzes
2
Errors
2
FPGA architectures
2
Fault tolerance
2
Field programmable gate arrays (FPGA)
2
Hamming code
2
Hardware architecture
2
Hardware implementations
2
Hash functions
2
Internet of things
2
Internet of things industries
2
SHA
2
SHA-3
2
SLIM
2
Security
2
Triple modular redundancy
2
VANET
2
cyber-security
2
fault tolerance
2
hash functions
2
in-memory computing
2
non-volatile memory
2
security
2
Asymmetric cryptosystem
1
Computer security
1
Feldman's scheme
1
Hash function
1
Healthcare system
1
Information technology industries
1
-
1
-
2
-
3by Al-Kuwari, Saif“...Cryptographic hash functions have always played a major role in most cryptographic applications...”
Published 2011
Get full text
-
4“...Cryptographic hash functions have become the basis of modern network computing for identity...”
Get full text
Article -
5by Applebaum, Benny, Haramaty-Krasne, Naama, Ishai, Yuval, Kushilevitz, Eyal, Vaikuntananthan, VinodGet fulltext
Published 2021
Article -
6
-
7
-
8
-
9“... functions in [1] and [2]. Keywords: Hash, Non-cryptographic hash functions, Benchmark, Hashing datasets...”
Get full text
Article -
10by E. V. ListopadSubjects: “...cryptographic hash function sha-1...”
Published 2019-06-01
Get full text
Article -
11
-
12by Mishal Almazrooie, Azman Samsudin, Adnan Abdul-Aziz Gutub, Muhammad Syukri Salleh, Mohd Adib Omar, Shahir Akram Hassan“... of the cryptographic hash function is to assure the integrity of the transmitted data. In this work, integrity...”
Published 2020-01-01
Get full text
Article -
13by P. G. Klyucharev“... automata based cryptographic hash functions. VHDL is used as a language and Altera FPGA as a platform...”
Published 2014-01-01
Get full text
Article -
14
-
15by Tautvydas BrukštusSubjects: “...cryptographic hash function...”
Published 2016-06-01
Get full text
Article -
16
-
17
-
18by Ethan Heilman, Neha Narula, Garrett Tanzer, James Lovejoy, Michael Colavita, Madars Virza, Tadge DryjaSubjects: “...cryptographic hash functions...”
Published 2020-09-01
Get full text
Article -
19
-
20by Harshvardhan TiwariSubjects: “...Cryptographic hash function...”
Published 2017-01-01
Get full text
Article