Digital Library

Search: "[ keyword: HASH ]" (6)

  1. Privacy Protection Model for Location-Based Services

  2. Approaches for Improving Bloom Filter-Based Set Membership Query

  3. Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions

  4. Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map

  5. Security Properties of Domain Extenders for Cryptographic Hash Functions

  6. Design of Cryptographic Hardware Architecture for Mobile Computing