检索结果 - "cryptographic hash function"
-
1
Theoretical and Experimental Analysis of Cryptographic Hash Functions
发表在 Journal of Telecommunications and Information Technology (2019-03-01)主题: “...cryptographic hash function...”
获取全文
文件 -
2
Reducing Power of BLAKE3 implementations with dedicated FPGA resources
发表在 International Journal of Electronics and Telecommunications (2025-07-01)主题: “...cryptographic hash function...”
获取全文
文件 -
3
ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS
主题: “...cryptographic hash function sha-1...”
获取全文
文件 -
4
Comparison of power consumption in pipelined implementations of the BLAKE3 cipher in FPGA devices
发表在 International Journal of Electronics and Telecommunications (2024-03-01)主题: “...cryptographic hash function...”
获取全文
文件 -
5
Comparison of power consumption in pipelined implementations of the BLAKE3 cipher in FPGA devices
发表在 International Journal of Electronics and Telecommunications (2024-03-01)主题: “...cryptographic hash function...”
获取全文
文件 -
6
Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains
发表在 Applied Sciences (2021-01-01)主题: “...cryptographic hash function...”
获取全文
文件 -
7
Merkle-Damgård Construction Method and Alternatives: A Review
发表在 Journal of Information and Organizational Sciences (2017-01-01)主题: “...Cryptographic hash function...”
获取全文
文件 -
8
Two New Lightweight Cryptographic Hash Functions Based on Saturnin and Beetle for the Internet of Things
发表在 IEEE Access (2023-01-01)主题: “...Lightweight cryptographic hash function...”
获取全文
文件 -
9
A lightweight cryptography (LWC) framework to secure memory heap in Internet of Things
发表在 Alexandria Engineering Journal (2021-02-01)主题: “...Cryptographic Hash Function (CHF)...”
获取全文
文件 -
10
A new design paradigm for provably secure keyless hash function with subsets and two variables polynomial function
发表在 Journal of King Saud University: Computer and Information Sciences (2022-05-01)主题: “...Subsets and polynomial function for cryptographic hash function...”
获取全文
文件 -
11
Parallelization of Rainbow Tables Generation Using Message Passing Interface: A Study on NTLMv2, MD5, SHA-256 and SHA-512 Cryptographic Hash Functions
发表在 Applied Sciences (2025-07-01)主题: “...cryptographic hash functions...”
获取全文
文件
