Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Chaos-based audio encryption algorithm using biometric image and SHA-256 hash algorithm
Rahul, B., Kuppusamy, K., Senthilrajan, A.
Published in Multimedia tools and applications (01.11.2023)
Published in Multimedia tools and applications (01.11.2023)
Get full text
Journal Article
Hash-Based Algorithms for Discretized Data
Robey, Rachel N., Nicholaeff, David, Robey, Robert W.
Published in SIAM journal on scientific computing (01.01.2013)
Published in SIAM journal on scientific computing (01.01.2013)
Get full text
Journal Article
Accelerating the SM3 hash algorithm with CPU‐FPGA Co‐Designed architecture
Huang, Xiaoying, Guo, Zhichuan, Song, Mangu, Zeng, Xuewen
Published in Chronic diseases and translational medicine (01.11.2021)
Published in Chronic diseases and translational medicine (01.11.2021)
Get full text
Journal Article
Blockchain based voting system using secure hash algorithm 384-bit (SHA-384) to enhance accuracy and comparing with secure hash algorithm 256-bit (SHA-256)
Pattem, R., Gomathi, S., Sungeetha, D., Nataraj, C.
Published in AIP conference proceedings (30.08.2024)
Published in AIP conference proceedings (30.08.2024)
Get full text
Journal Article
Conference Proceeding
Comparison of fully anonymous novel HMAC encryption algorithm with IDEA encryption algorithm for secured data retrieval with reduced time
Get full text
Journal Article
Conference Proceeding
AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY
GURPREET K. SODHI, GURJOT S. GABA
Published in Journal of engineering science & technology (01.03.2018)
Get full text
Published in Journal of engineering science & technology (01.03.2018)
Journal Article
Fixed-point attack on Davies—Meyer hash function scheme based on SIMON, SPECK, and SIMECK algorithms
Permana, Oky Jati, Susanti, Bety Hayat, Christine, Magdalena
Published in AIP conference proceedings (09.03.2023)
Published in AIP conference proceedings (09.03.2023)
Get full text
Journal Article
Conference Proceeding
A vehicle license plate data access model based on the jump hash consistency algorithm
Wang, Wei, Cheng, Wenfang, Chen, Jing, Wang, Zhen, Zhang, Yuran, Yu, Yingfang
Published in PloS one (24.08.2023)
Published in PloS one (24.08.2023)
Get full text
Journal Article