咨询与建议

限定检索结果

文献类型

  • 2 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 计算机科学与技术...
  • 1 篇 理学
    • 1 篇 数学

主题

  • 3 篇 secure hash algo...
  • 1 篇 clock network sy...
  • 1 篇 cloud to cloud m...
  • 1 篇 blockchain ledge...
  • 1 篇 efficient softwa...
  • 1 篇 data flow
  • 1 篇 ai chips
  • 1 篇 near-threshold c...
  • 1 篇 deep pipelines
  • 1 篇 bitcoin mining m...
  • 1 篇 blockchain

机构

  • 1 篇 digwise technol ...
  • 1 篇 department of ma...
  • 1 篇 vtu belagavi
  • 1 篇 sai vidya inst t...
  • 1 篇 gitam univ dept ...
  • 1 篇 israel developme...
  • 1 篇 natl taiwan univ...

作者

  • 1 篇 yang chih-wen
  • 1 篇 gueron shay
  • 1 篇 lu chien-pang
  • 1 篇 jiang iris hui-r...
  • 1 篇 aruna m. g.
  • 1 篇 mohan k. g.

语言

  • 3 篇 英文
检索条件"主题词=Secure Hash Algorithms"
3 条 记 录,以下是1-10 订阅
排序:
Clock Design Methodology for Energy and Computation Efficient Bitcoin Mining Machines  22
Clock Design Methodology for Energy and Computation Efficien...
收藏 引用
31st edition of the ACM International Symposium on Physical Design (ISPD)
作者: Lu, Chien-Pang Jiang, Iris Hui-Ru Yang, Chih-Wen Natl Taiwan Univ Taipei Taiwan DigWise Technol Ltd Zhubei Taiwan
Bitcoin mining machines become a new driving force to push the physical limitation of semiconductor process technology. Instead of peak performance, mining machines pursue energy and computation efficiency of implemen... 详细信息
来源: 评论
Designing a Multi-party Collaborator of Explicit Units of the Blockchain to Mitigate the Security Attacks on the Data Migration from Cloud to Cloud
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2021年 第4期121卷 3243-3261页
作者: Aruna, M. G. Mohan, K. G. Sai Vidya Inst Technol Dept Comp Sci & Engn Bengaluru India VTU Belagavi India GITAM Univ Dept Comp Sci & Engn Bengaluru India
The advancement of internet-based applications generated enormous voluminous media data, requiring effective storage and processing pipelines to handle the complexity of data and flow of information. For many years, c... 详细信息
来源: 评论
Speeding up SHA-1, SHA-256 and SHA-512 on the 2nd generation Intel® Core™ processors
Speeding up SHA-1, SHA-256 and SHA-512 on the 2nd generation...
收藏 引用
9th International Conference on Information Technology, ITNG 2012
作者: Gueron, Shay Department of Mathematics University of Haifa Haifa Israel Israel Development Center Intel Corporation Haifa Israel
This paper discusses some software techniques, targeted specifically to the 2nd Generation Intel® Core™ processor, for speeding up the NIST standardized secure hash algorithms SHA-1, SHA-256 and SHA-512. We demon... 详细信息
来源: 评论