咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 43 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 108 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 72 篇 工学
    • 64 篇 计算机科学与技术...
    • 33 篇 电气工程
    • 20 篇 信息与通信工程
    • 14 篇 软件工程
    • 11 篇 电子科学与技术(可...
    • 4 篇 网络空间安全
    • 3 篇 控制科学与工程
    • 2 篇 石油与天然气工程
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 材料科学与工程(可...
  • 13 篇 理学
    • 11 篇 数学
    • 2 篇 物理学
    • 1 篇 科学技术史(分学科...
  • 6 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 2 篇 法学
    • 2 篇 法学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 108 篇 cryptographic ha...
  • 12 篇 cryptography
  • 10 篇 encryption
  • 8 篇 security
  • 7 篇 resistance
  • 7 篇 authentication
  • 6 篇 sha-3
  • 5 篇 quantum computin...
  • 5 篇 md5
  • 5 篇 sha-1
  • 5 篇 blockchain
  • 5 篇 public key
  • 4 篇 computer science
  • 4 篇 hash chain
  • 4 篇 elliptic curve c...
  • 4 篇 ciphers
  • 4 篇 message authenti...
  • 4 篇 costs
  • 4 篇 steganography
  • 4 篇 protocols

机构

  • 3 篇 fernuniv hagen
  • 2 篇 indian sch mines...
  • 2 篇 bauhaus univ wei...
  • 1 篇 nara inst sci & ...
  • 1 篇 center for advan...
  • 1 篇 thapar univ dept...
  • 1 篇 federal institut...
  • 1 篇 ecole polytech f...
  • 1 篇 univ indonesia f...
  • 1 篇 mil communicat i...
  • 1 篇 courant institut...
  • 1 篇 school of comput...
  • 1 篇 univ kentucky co...
  • 1 篇 cuny grad ctr de...
  • 1 篇 chinese acad sci...
  • 1 篇 indian stat inst...
  • 1 篇 jaypee inst info...
  • 1 篇 sci & technol co...
  • 1 篇 int islamic univ...
  • 1 篇 wuhan univ sch c...

作者

  • 4 篇 zhang xiaowen
  • 4 篇 chum chi sing
  • 3 篇 sugier jaroslaw
  • 2 篇 kishore neha
  • 2 篇 gorski michael
  • 2 篇 tiwari harshvard...
  • 2 篇 keller joerg
  • 2 篇 asawa krishna
  • 2 篇 hirose shoichi
  • 2 篇 fleischmann ewan
  • 2 篇 shikata junji
  • 2 篇 biswas g. p.
  • 2 篇 lucks stefan
  • 2 篇 islam s. k. hafi...
  • 2 篇 wendzel steffen
  • 1 篇 li mengyang
  • 1 篇 saygin siddiq ah...
  • 1 篇 muhammad salman
  • 1 篇 huijia lin
  • 1 篇 francesco morich...

语言

  • 106 篇 英文
  • 2 篇 其他
检索条件"主题词=Cryptographic hash function"
108 条 记 录,以下是1-10 订阅
排序:
cryptographic hash function: A High Level View
Cryptographic Hash Function: A High Level View
收藏 引用
International Conference on Informatics and Creative Multimedia (ICICM)
作者: Alkandari, Abdulaziz Ali Al-Shaikhli, Imad Fakhri Alahmad, Mohammad A. PAAET Coll Basic Educ Dept Comp Aladailya Kuwait Int Islamic Univ Malaysia Dept Comp Sci Kuala Lumpur 53100 Malaysia
cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. Th... 详细信息
来源: 评论
Finding Bugs in cryptographic hash function Implementations
收藏 引用
IEEE TRANSACTIONS ON RELIABILITY 2018年 第3期67卷 870-884页
作者: Mouha, Nicky Raunak, Mohammad S. Kuhn, D. Richard Kacker, Raghu NIST Informat Technol Lab Comp Secur Div Gaithersburg MD 20899 USA NIST Comp Secur Div Gaithersburg MD 20899 USA Loyola Univ Maryland Dept Comp Sci Baltimore MD 21210 USA
cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unn... 详细信息
来源: 评论
A secure and efficient cryptographic hash function based on NewFORK-256
收藏 引用
EGYPTIAN INFORMATICS JOURNAL 2012年 第3期13卷 199-208页
作者: Tiwari, Harshvardhan Asawa, Krishna JIIT Deemed Univ Dept Comp Sci & Engn Noida UP India
cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random... 详细信息
来源: 评论
Modeling Spline Curves for Lightweight cryptographic hash function
Modeling Spline Curves for Lightweight Cryptographic Hash Fu...
收藏 引用
2023 IEEE Global Conference on Information Technologies and Communications, GCITC 2023
作者: Agarwal, Shalini Amity University Amity School of Engineering and Technology Lucknow India
Parametric spline curves offer flexibility, smoothness and ability to represent complex shapes in various fields of Computer Graphics and other related fields. These mathematical curves are popularly used for interpol... 详细信息
来源: 评论
Parallelizing cryptographic hash function Using Relaxed Encryption Framework*
收藏 引用
Chinese Journal of Electronics 2023年 第4期20卷 621-624页
作者: GAN Xinbiao WANG Zhiying SHEN Li LIU Cong LAI Xin School of Computer National University of Defense Technology Changsha China
With embarrass of high complexity of cryptographic hash function (CHF) and difficulty of parallelizing CHF, a relaxed encryption framework for parallelizing CHF is proposed after understanding principle of hash value ... 详细信息
来源: 评论
cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2019年 第13期78卷 17973-17994页
作者: Li, Yantao Ge, Guangfu Chongqing Univ Coll Comp Sci Chongqing 400044 Peoples R China Southwest Univ Coll Comp & Informat Sci Chongqing 400715 Peoples R China
cryptographic hash functions can map data of arbitrary size to data of fixed size (hash values), which can be used in a wide range of multimedia applications for communication security, such as integrity protection, m... 详细信息
来源: 评论
An Approach to Secure Capacity Optimization in Cloud Computing using cryptographic hash function and Data De-duplication
An Approach to Secure Capacity Optimization in Cloud Computi...
收藏 引用
International Conference on Intelligent Sustainable Systems (ICISS)
作者: Magesh Kumar S Balasundaram A Kothandaraman D Auxilia Osvin Nancy V P. J. Sathish Kumar Ashokkumar S Saveetha School of Engineering SIMATS Chennai Tamil Nadu India School of Computer Science and Engineering Centre for Cyber Physical Systems Vellore Institute of Technology (VIT) Chennai India School of Computer Science and Artificial Intelligence SR University Warangal TS India S.A. Engineering College Chennai India Panimalar Engineering College Chennai India
Capacity Optimization in Cloud computing is a common term for innovations used to progress storage use by dwindling stored data. Crucial methodologies used for capacity optimization in cloud computing are data compres... 详细信息
来源: 评论
EFFICIENT AUTHENTICATION PROTOCOL USING cryptographic hash function & LSB DYNAMIC HOP IMAGE STEGANOGRAPHIC TECHNIQUE FOR SECURE COMMUNICATION
EFFICIENT AUTHENTICATION PROTOCOL USING CRYPTOGRAPHIC HASH F...
收藏 引用
International Conference on Recent Trends in Engineering, Science & Technology
作者: B. Madhuravani D. S. R. Murthy Department of CSE MLR Institute of Technology Department of CSE Geethanjali College of Engineering & Technology
A novel new verification convention utilizing a cryptographic hash function and a Steganography using a hop variable is displayed in this paper. This convention chooses a cryptographic hash work progressively and crea... 详细信息
来源: 评论
E-Voting and e-Recap Verification and Validation Schemes for Indonesia Utilizing cryptographic hash function Message Authentication Codes (MAC) and Public Key Infrastructure (PKI)
E-Voting and e-Recap Verification and Validation Schemes for...
收藏 引用
International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)
作者: Alfonso Brolin Sihite Muhammad Salman University of Indonesia Depok Indonesia
Conventional elections have many shortcomings, some of them are the calculation of a real count that takes a long time, the big costs of printing ballot papers and distribution costs both from the center to the region... 详细信息
来源: 评论
A heuristic subexponential algorithm to find paths in Markoff graphs over finite fields
收藏 引用
RESEARCH IN NUMBER THEORY 2025年 第1期11卷 1-24页
作者: Silverman, Joseph H. Brown Univ Math Dept Box 1917 Providence RI 02912 USA
Charles et al (J Cryptol 22(1):93-113, 2009) explained how one can construct hash functions using expander graphs in which it is hard to find paths between specified vertices. The set of solutions to the classical Mar... 详细信息
来源: 评论