-
1
A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase
Published 2023-01-01Subjects: Get full text
Article -
2
Estimating similarity and distance using FracMinHash
Published 2025-05-01Subjects: “…Hashing…”
Get full text
Article -
3
Quantum Attacks on HCTR and Its Variants
Published 2020-01-01Subjects: Get full text
Article -
4
A new lattice-based partially blind signature with more complete proof
Published 2024-05-01Subjects: Get full text
Article -
5
An Ordered Universal Accumulator Based on a Hash Chain
Published 2025-02-01Subjects: Get full text
Article -
6
EGA: An Efficient GPU Accelerated Groupby Aggregation Algorithm
Published 2025-03-01Subjects: Get full text
Article -
7
Tıbbi DICOM Veri Güvenliğinde Hibrit Yöntemlerin Kullanılması
Published 2020-04-01Subjects: Get full text
Article -
8
One-way hash function with chaotic dynamic parameters
Published 2008-01-01Subjects: “…hash function…”
Get full text
Article -
9
One-way hash function with chaotic dynamic parameters
Published 2008-01-01Subjects: “…hash function;chaos;dynamic parameter…”
Get full text
Article -
10
Breaking novel and lightweight digital <sub>s</sub> ignature scheme
Published 2013-07-01Subjects: “…digital signature;hash function;cryptanalysis…”
Get full text
Article -
11
Revocable policy-based chameleon hash using lattices
Published 2024-11-01Subjects: Get full text
Article -
12
Extended integer tent maps and dynamic hash function
Published 2010-01-01Subjects: “…hash function…”
Get full text
Article -
13
Secure resource metering and accounting with hash chain in cloud storage
Published 2013-08-01Subjects: Get full text
Article -
14
Secure Parallel Image Cryptographic Hash Function Using a Novel 2D High-Randomness Hyperchaotic Map
Published 2025-06-01Subjects: Get full text
Article -
15
Research and Implementation of SlAP Monitor in LTE Network
Published 2013-01-01Subjects: “…LTE;SlAP;protocol monitor;Hash index…”
Get full text
Article -
16
Research on optimization of indoor positioning batch ranging system based on DS-TWR algorithm
Published 2022-01-01Subjects: Get full text
Article -
17
A Zero-Trust Multi-Processor Reporter-Verifier Design of Edge Devices for Firmware Authenticity in Internet of Things and Blockchain Applications
Published 2025-03-01Subjects: Get full text
Article -
18
Research and Implementation of SlAP Monitor in LTE Network
Published 2013-01-01Subjects: Get full text
Article -
19
Android malware detection method based on SimHash
Published 2017-11-01Subjects: Get full text
Article -
20
Cryptanalysis of some chaos-based keyed hash functions
Published 2011-01-01Subjects: “…chaos;keyed hash function;forgery;key recovery…”
Get full text
Article