Showing 1 - 20 results of 98 for search '"cryptographic hash function"', query time: 2.78s Refine Results
  1. 1
  2. 2
  3. 3
    by Al-Kuwari, Saif
    Published 2011
    ...Cryptographic hash functions have always played a major role in most cryptographic applications...
    Get full text
  4. 4
    by Dexi Wang, Yu Jiang, Houbing Song, Fei He, Ming Gu, Jiaguang Sun
    Published 2017-01-01
    ...Cryptographic hash functions have become the basis of modern network computing for identity...
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
    ... functions in [1] and [2]. Keywords: Hash, Non-cryptographic hash functions, Benchmark, Hashing datasets...
    Get full text
    Article
  10. 10
    by E. V. Listopad
    Published 2019-06-01
    Subjects: ...cryptographic hash function sha-1...
    Get full text
    Article
  11. 11
    by Harshvardhan Tiwari, Krishna Asawa
    Published 2012-11-01
    Subjects: ...Cryptographic hash function...
    Get full text
    Article
  12. 12
    ... of the cryptographic hash function is to assure the integrity of the transmitted data. In this work, integrity...
    Get full text
    Article
  13. 13
    by P. G. Klyucharev
    Published 2014-01-01
    ... automata based cryptographic hash functions. VHDL is used as a language and Altera FPGA as a platform...
    Get full text
    Article
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
    by Tiwari Harshvardhan, Asawa Krishna
    Published 2014-06-01
    Subjects: ...cryptographic hash function...
    Get full text
    Article
  20. 20
    by Harshvardhan Tiwari
    Published 2017-01-01
    Subjects: ...Cryptographic hash function...
    Get full text
    Article